Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20111117055022.GB24831@sota.gen.nz>
Date: Thu, 17 Nov 2011 05:50:22 +0000
From: Ben Hawkes <hawkes@...a.gen.nz>
To: oss-security@...ts.openwall.com
Subject: CVE Request: nginx resolver heap overflow

Hi,

The nginx team have released stable version 1.0.10, which includes a fix 
for a heap overflow bug in the custom DNS resolver:

http://trac.nginx.org/nginx/changeset/4268/nginx

The resolver is most commonly used with the proxy and fastcgi modules,
which are not enabled by default.

In order to trigger this condition an attacker would need to be in
control of an upstream resolver host, or be in a position to brute-force
the weakly generated 16-bit transaction identifier.

Thanks,
Ben Hawkes

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.