A vulnerability in the nginx web server may allow remote attackers to execute arbitrary code on an affected system.
nginx is an HTTP server and mail proxy server that is available for a number of different platforms. A buffer underflow vulnerability exists in the ngx_http_parse_complex_uri() function when handling specially crafted URIs. Exploitation of this vulnerability would cause the nginx server to write data contained in the URI to heap memory before the allocated buffer.
As with a number of other web servers, nginx is designed to operate with a single privileged master process and multiple unprivileged worker processes handling specific requests. A remote, unauthenticated attacker may be able to execute arbitrary code in the context of the worker process or cause the worker process to crash, resulting in a denial of service.
Upgrade or apply a patch
Updated versions of the nginx package have been released to address this issue. Users should consult the Systems Affected section of this document for information about specific vendors.
Sun Microsystems, Inc.
The SCO Group
DragonFly BSD Project
Engarde Secure Linux
F5 Networks, Inc.
Juniper Networks, Inc.
Mandriva S. A.
MontaVista Software, Inc.
QNX Software Systems Inc.
Red Hat, Inc.
Silicon Graphics, Inc.
Slackware Linux Inc.
Wind River Systems, Inc.
Thanks to Chris Ries of the Carnegie Mellon University Information Security Office for reporting this vulnerability.
This document was written by Chad R Dougherty.
|Date First Published:||2009-09-15|
|Date Last Updated:||2009-09-21 19:50 UTC|