nginx < 1.0.10 DNS Resolver Remote Heap Buffer Overflow
Medium Nessus Network Monitor Plugin ID 6456
SynopsisThe remote web server is affected by a buffer-overflow vulnerability.
DescriptionThe remote host is running a nginx HTTP server.
Versions earlier than 1.0.10 are vulnerable to a remote heap-based buffer-overflow vulnerability due to a failure to properly bounds check user-supplied input to the DNS resolver. The issue occurs specifically when the DNS resolver processes messages more than 255 bytes. Successfully exploiting this issue allows attackers to execute arbitrary code in the context of the application. (CVE-2011-4314)
SolutionUpgrade to nginx 1.0.10 or later.