Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests.
References
Link | Resource |
---|---|
http://nginx.net/CHANGES-0.6 | Release Notes Vendor Advisory |
http://nginx.net/CHANGES-0.7 | Release Notes Vendor Advisory |
http://www.debian.org/security/2009/dsa-1884 | Third Party Advisory |
http://nginx.net/CHANGES-0.5 | Release Notes Vendor Advisory |
http://www.kb.cert.org/vuls/id/180065 | Third Party Advisory US Government Resource |
http://sysoev.ru/nginx/patch.180065.txt | Broken Link |
http://nginx.net/CHANGES | Release Notes Vendor Advisory |
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00442.html | Third Party Advisory |
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00428.html | Third Party Advisory |
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00449.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2009-09-15 15:30
Updated : 2021-11-10 07:52
NVD link : CVE-2009-2629
Mitre link : CVE-2009-2629
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
debian
- debian_linux
f5
- nginx
fedoraproject
- fedora