5.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:P/A:P
0.005 Low
EPSS
Percentile
75.3%
The remote host is running a nginx HTTP server.
Versions earlier than 1.0.10 are vulnerable to a remote heap-based buffer-overflow vulnerability due to a failure to properly bounds check user-supplied input to the DNS resolver. The issue occurs specifically when the DNS resolver processes messages more than 255 bytes. Successfully exploiting this issue allows attackers to execute arbitrary code in the context of the application. (CVE-2011-4314)
Binary data 6456.prm
Vendor | Product | Version | CPE |
---|---|---|---|
igor_sysoev | nginx | cpe:/a:igor_sysoev:nginx |