|
Message-ID: <20111117055022.GB24831@sota.gen.nz> Date: Thu, 17 Nov 2011 05:50:22 +0000 From: Ben Hawkes <hawkes@...a.gen.nz> To: oss-security@...ts.openwall.com Subject: CVE Request: nginx resolver heap overflow Hi, The nginx team have released stable version 1.0.10, which includes a fix for a heap overflow bug in the custom DNS resolver: http://trac.nginx.org/nginx/changeset/4268/nginx The resolver is most commonly used with the proxy and fastcgi modules, which are not enabled by default. In order to trigger this condition an attacker would need to be in control of an upstream resolver host, or be in a position to brute-force the weakly generated 16-bit transaction identifier. Thanks, Ben Hawkes
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.