Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 17 Nov 2011 05:50:22 +0000
From: Ben Hawkes <hawkes@...a.gen.nz>
To: oss-security@...ts.openwall.com
Subject: CVE Request: nginx resolver heap overflow

Hi,

The nginx team have released stable version 1.0.10, which includes a fix 
for a heap overflow bug in the custom DNS resolver:

http://trac.nginx.org/nginx/changeset/4268/nginx

The resolver is most commonly used with the proxy and fastcgi modules,
which are not enabled by default.

In order to trigger this condition an attacker would need to be in
control of an upstream resolver host, or be in a position to brute-force
the weakly generated 16-bit transaction identifier.

Thanks,
Ben Hawkes

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ