Lucene search

K
f5F5F5:K23073482
HistoryMay 11, 2016 - 12:00 a.m.

K23073482 : Nginx vulnerabilities CVE-2016-0742, CVE-2016-0746, and CVE-2016-0747

2016-05-1100:00:00
my.f5.com
41

AI Score

8.2

Confidence

Low

EPSS

0.871

Percentile

98.6%

Security Advisory Description

The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (invalid pointer dereference and worker process crash) via a crafted UDP DNS response.

Use-after-free vulnerability in the resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.

The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 does not properly limit CNAME resolution, which allows remote attackers to cause a denial of service (worker process resource consumption) via vectors related to arbitrary name resolution.
Impact
An attacker can exploit these vulnerabilities to crash the worker process or to cause an excessive resource consumption in the worker processes. On the BIG-IQ system, the default configuration of nginx orwebd does not use the server interface to do outbound SSL connections.