Lucene search

K
nessusTenable6456.PRM
HistoryApr 17, 2012 - 12:00 a.m.

nginx < 1.0.10 DNS Resolver Remote Heap Buffer Overflow

2012-04-1700:00:00
Tenable
www.tenable.com
17

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

0.005 Low

EPSS

Percentile

75.3%

The remote host is running a nginx HTTP server.

Versions earlier than 1.0.10 are vulnerable to a remote heap-based buffer-overflow vulnerability due to a failure to properly bounds check user-supplied input to the DNS resolver. The issue occurs specifically when the DNS resolver processes messages more than 255 bytes. Successfully exploiting this issue allows attackers to execute arbitrary code in the context of the application. (CVE-2011-4314)

Binary data 6456.prm
VendorProductVersionCPE
igor_sysoevnginxcpe:/a:igor_sysoev:nginx

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

0.005 Low

EPSS

Percentile

75.3%