search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Nginx ngx_http_parse_complex_uri() buffer underflow vulnerability

Vulnerability Note VU#180065

Original Release Date: 2009-09-15 | Last Revised: 2009-09-21

Overview

A vulnerability in the nginx web server may allow remote attackers to execute arbitrary code on an affected system.

Description

nginx is an HTTP server and mail proxy server that is available for a number of different platforms. A buffer underflow vulnerability exists in the ngx_http_parse_complex_uri() function when handling specially crafted URIs. Exploitation of this vulnerability would cause the nginx server to write data contained in the URI to heap memory before the allocated buffer.

Impact

As with a number of other web servers, nginx is designed to operate with a single privileged master process and multiple unprivileged worker processes handling specific requests. A remote, unauthenticated attacker may be able to execute arbitrary code in the context of the worker process or cause the worker process to crash, resulting in a denial of service.

Solution

Upgrade or apply a patch

Updated versions of the nginx package have been released to address this issue. Users should consult the Systems Affected section of this document for information about specific vendors.

Vendor Information

180065
 

View all 40 vendors View less vendors


CVSS Metrics

Group Score Vector
Base 0 AV:--/AC:--/Au:--/C:--/I:--/A:--
Temporal 0 E:ND/RL:ND/RC:ND
Environmental 0 CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Chris Ries of the Carnegie Mellon University Information Security Office for reporting this vulnerability.

This document was written by Chad R Dougherty.

Other Information

CVE IDs: CVE-2009-2629
Severity Metric: 4.22
Date Public: 2009-09-14
Date First Published: 2009-09-15
Date Last Updated: 2009-09-21 19:50 UTC
Document Revision: 9

Sponsored by CISA.