Join the community today
Become a Member

Nginx [nginx-announce] nginx security advisory (CVE-2014-0133)

Discussion in 'Nginx and PHP-FPM news & discussions' started by eva2000, Jun 7, 2014.

  1. eva2000

    eva2000 Administrator Staff Member

    May 24, 2014
    Brisbane, Australia
    Local Time:
    7:08 AM
    Nginx 1.13.x
    MariaDB 5.5

    A bug in the experimental SPDY implementation in nginx was found, which
    might allow an attacker to cause a heap memory buffer overflow in a
    worker process by using a specially crafted request, potentially
    resulting in arbitrary code execution (CVE-2014-0133).

    The problem affects nginx 1.3.15 - 1.5.11, compiled with the
    ngx_http_spdy_module module (which is not compiled by default) and
    without --with-debug configure option, if the "spdy" option of the
    "listen" directive is used in a configuration file.

    The problem is fixed in nginx 1.5.12, 1.4.7.

    Patch for the problem can be found here:

    Thanks to Lucas Molas, researcher at Programa STIC, FundaciĆ³n Dr. Manuel
    Sadosky, Buenos Aires, Argentina.

    Maxim Dounin

    nginx-announce mailing list

    Continue reading...