Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <4EC52F2A.2020001@redhat.com>
Date: Thu, 17 Nov 2011 08:58:34 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE Request: nginx resolver heap overflow

On 11/17/2011 08:37 AM, Kurt Seifried wrote:
> On 11/16/2011 10:50 PM, Ben Hawkes wrote:
>> Hi,
>>
>> The nginx team have released stable version 1.0.10, which includes a fix 
>> for a heap overflow bug in the custom DNS resolver:
>>
>> http://trac.nginx.org/nginx/changeset/4268/nginx
>>
>> The resolver is most commonly used with the proxy and fastcgi modules,
>> which are not enabled by default.
>>
>> In order to trigger this condition an attacker would need to be in
>> control of an upstream resolver host, or be in a position to brute-force
>> the weakly generated 16-bit transaction identifier.
>>
>> Thanks,
>> Ben Hawkes
> Do you need a CVE # for this issue?
>
And this is why coffee is a popular morning drink (and Kurt should have
some =).

Please use CVE-2011-4315 for this issue.

-- 

-Kurt Seifried / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.