nginx HTTP Request Header Remote Buffer Overflow

high Nessus Network Monitor Plugin ID 5216

Synopsis

The remote web server is affected by a remote denial of service vulnerability.

Description

The remote host is running a version of nginx web server earlier than 0.5.38, 0.6.39, or 0.7.62. Such versions are potentially affected by a remote denial of service vulnerability because the application fails to to perform adequate bounds checking in the 'ngx_http_process_request_headers()' function of the 'src/http/ngx_http_request.c' source file. An attacker, exploiting this flaw, can cause the web server to crash, or potentially run arbitrary code subject to the privileges of the web server process.

Solution

Apply the patch from the vendor, or upgrade to nginx 0.5.38, 0.6.39, or 0.7.62

See Also

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552035

Plugin Details

Severity: High

ID: 5216

Family: Web Servers

Published: 10/28/2009

Updated: 3/6/2019

Nessus ID: 41608

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 6.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:X

Vulnerability Information

CPE: cpe:/a:nginx:nginx

Patch Publication Date: 10/26/2009

Vulnerability Publication Date: 10/26/2009

Reference Information

CVE: CVE-2009-3896

BID: 36839