Welcome! Log In Create A New Profile

Advanced

RE: buffer overflow CVE-2011-4315

Lukas Tribus
April 12, 2012 06:22PM
You are running a release which dates back to December 2010. The last relase in the 0.8 train is from July 2011, while CVE-2011-4315 was fixed in November 2011. You can assume your version is vulnerable.

If you can't upgrade to current stable you will need to backport the bugfix to 0.8.


CVE-2011-4315 is missing on the nginx security advisories on nginx.org, can someone add it?


BR,

Lukas



> Date: Fri, 13 Apr 2012 00:11:23 +0200
> From: lists@ruby-forum.com
> To: nginx@nginx.org
> Subject: buffer overflow CVE-2011-4315
>
> we are running nginx 0.8.54, I'm trying to pass PCI compliance testing
> they say this is vulnerable to a buffer overflow.
>
> however when i try and find out if it is i can't seem to find out.
>
> http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4315
>
> http://www.securityfocus.com/bid/50710
>
> these links don't show that my version has this flaw.
>
> i'm hoping there is a link to show that this version is safe.
>
> Thanks
>
> Stephen
>
> --
> Posted via http://www.ruby-forum.com/.
>
> _______________________________________________
> nginx mailing list
> nginx@nginx.org
> http://mailman.nginx.org/mailman/listinfo/nginx
_______________________________________________
nginx mailing list
nginx@nginx.org
http://mailman.nginx.org/mailman/listinfo/nginx
Subject Author Posted

buffer overflow CVE-2011-4315

stephen van dyken April 12, 2012 06:12PM

RE: buffer overflow CVE-2011-4315

Lukas Tribus April 12, 2012 06:22PM

Re: buffer overflow CVE-2011-4315

Andrew Alexeev April 13, 2012 06:16AM

Re: buffer overflow CVE-2011-4315

stephen van dyken April 12, 2012 06:42PM

RE: buffer overflow CVE-2011-4315

Lukas Tribus April 12, 2012 07:06PM

Re: buffer overflow CVE-2011-4315

Igor Sysoev April 13, 2012 07:12AM



Sorry, only registered users may post in this forum.

Click here to login

Online Users

Guests: 208
Record Number of Users: 8 on April 13, 2023
Record Number of Guests: 421 on December 02, 2018
Powered by nginx      Powered by FreeBSD      PHP Powered      Powered by MariaDB      ipv6 ready