Nginx 1.9.x < 1.9.6 HTTPv2 PRI Double-Free DoS

high Web App Scanning Plugin ID 98961

Synopsis

Nginx 1.9.x < 1.9.6 HTTPv2 PRI Double-Free DoS

Description

According to the self-reported version in its response header, the version of nginx hosted on the remote web server is 1.9.x prior to 1.9.6. It is, therefore, affected by a denial of service vulnerability due to a double-free memory error in the HTTPv2 module that is triggered when handling certain PRI packets. An unauthenticated, remote attacker can exploit this, via a crafted RPI packet, to cause a section of heap-based memory to be freed twice, which can result in crashing the server.

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to nginx version 1.9.6 or later.

See Also

http://mailman.nginx.org/pipermail/nginx-announce/2015/000163.html

http://nginx.org/en/security_advisories.html

https://www.security-assessment.com/files/documents/advisory/Nginx%20ngx_destroy_pool%20HTTP2%20Double%20Free.pdf

Plugin Details

Severity: High

ID: 98961

Type: remote

Published: 11/5/2018

Updated: 3/14/2023

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 5.1

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: Tenable

CVSS v3

Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS Score Source: Tenable

Vulnerability Information

CPE: cpe:2.3:a:nginx:nginx:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/27/2015

Vulnerability Publication Date: 10/29/2015

Reference Information