Welcome! Log In Create A New Profile

Advanced

nginx security advisory (CVE-2014-0088)

Maxim Dounin
March 04, 2014 10:26AM
Hello!

A bug in the experimental SPDY implementation in nginx 1.5.10 was found,
which might allow an attacker to corrupt worker process memory by using
a specially crafted request, potentially resulting in arbitrary code
execution (CVE-2014-0088).

The problem only affects nginx 1.5.10 on 32-bit platforms, compiled with
the ngx_http_spdy_module module (which is not compiled by default), if
the "spdy" option of the "listen" directive is used in a configuration
file.

The problem is fixed in nginx 1.5.11.

Patch for the problem can be found here:

http://nginx.org/download/patch.2014.spdy.txt

Thanks to Lucas Molas, researcher at Programa STIC, FundaciĆ³n Dr. Manuel
Sadosky, Buenos Aires, Argentina.


--
Maxim Dounin
http://nginx.org/en/donation.html

_______________________________________________
nginx mailing list
nginx@nginx.org
http://mailman.nginx.org/mailman/listinfo/nginx
Subject Author Posted

nginx security advisory (CVE-2014-0088)

Maxim Dounin March 04, 2014 10:26AM



Sorry, only registered users may post in this forum.

Click here to login

Online Users

Guests: 300
Record Number of Users: 8 on April 13, 2023
Record Number of Guests: 421 on December 02, 2018
Powered by nginx      Powered by FreeBSD      PHP Powered      Powered by MariaDB      ipv6 ready