[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2016-655 ---- nginx

ID: oval:org.secpod.oval:def:1600371Date: (C)2016-05-19   (M)2022-09-23
Class: PATCHFamily: unix




It was discovered that nginx could perform an out of bound read and dereference an invalid pointer when resolving CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to crash if nginx enabled the resolver in its configuration. A use-after-free flaw was found in the way nginx resolved certain CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to crash or, possibly, execute arbitrary code if nginx enabled the resolver in its configuration. It was discovered that nginx did not limit recursion when resolving CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to use an excessive amount of resources if nginx enabled the resolver in its configuration

Platform:
Amazon Linux AMI
Product:
nginx
Reference:
ALAS-2016-655
CVE-2016-0747
CVE-2016-0746
CVE-2016-0742
CVE    3
CVE-2016-0742
CVE-2016-0747
CVE-2016-0746
CPE    2
cpe:/o:amazon:linux
cpe:/a:igor_sysoev:nginx

© SecPod Technologies