[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2013-2070Date: (C)2013-07-26   (M)2023-12-22


http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.8
Exploit Score: 8.6
Impact Score: 4.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: PARTIAL
Integrity: NONE
Availability: PARTIAL
  
Reference:
SECUNIA-55181
BID-59824
DSA-2721
FEDORA-2013-8182
GLSA-201310-04
http://mailman.nginx.org/pipermail/nginx-announce/2013/000114.html
http://seclists.org/oss-sec/2013/q2/291
http://www.openwall.com/lists/oss-security/2013/05/13/3
http://nginx.org/download/patch.2013.proxy.txt
https://bugzilla.redhat.com/show_bug.cgi?id=962525
nginx-cve20132070-dos(84172)

CPE    2
cpe:/o:debian:debian_linux:6.0
cpe:/o:debian:debian_linux:7.0
OVAL    3
oval:org.secpod.oval:def:104912
oval:org.secpod.oval:def:601068
oval:org.secpod.oval:def:1600245

© SecPod Technologies