Welcome to Centmin Mod Community
Become a Member

Nginx [nginx-announce] nginx security advisory (CVE-2014-0088)

Discussion in 'Nginx and PHP-FPM news & discussions' started by eva2000, Jun 7, 2014.

Tags:
  1. eva2000

    eva2000 Administrator Staff Member

    36,055
    7,910
    113
    May 24, 2014
    Brisbane, Australia
    Ratings:
    +12,192
    Local Time:
    6:14 PM
    Nginx 1.15.x
    MariaDB 5.5/10.x
    Hello!

    A bug in the experimental SPDY implementation in nginx 1.5.10 was found,
    which might allow an attacker to corrupt worker process memory by using
    a specially crafted request, potentially resulting in arbitrary code
    execution (CVE-2014-0088).

    The problem only affects nginx 1.5.10 on 32-bit platforms, compiled with
    the ngx_http_spdy_module module (which is not compiled by default), if
    the "spdy" option of the "listen" directive is used in a configuration
    file.

    The problem is fixed in nginx 1.5.11.

    Patch for the problem can be found here:

    http://nginx.org/download/patch.2014.spdy.txt

    Thanks to Lucas Molas, researcher at Programa STIC, Fundación Dr. Manuel
    Sadosky, Buenos Aires, Argentina.


    --
    Maxim Dounin
    http://nginx.org/en/donation.html

    _______________________________________________
    nginx-announce mailing list
    [email protected]
    http://mailman.nginx.org/mailman/listinfo/nginx-announce

    Continue reading...
     
..