blob: f05ab05bd6c18e4d196f13f504fb354ba060307c [file] [log] [blame]
<?xml version="1.0" encoding="UTF-8"?>
<glsa id="201203-22">
<title>nginx: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been found in nginx, the worst of
which may allow execution of arbitrary code.
<product type="ebuild">nginx</product>
<announced>March 28, 2012</announced>
<revised>March 28, 2012: 1</revised>
<package name="www-servers/nginx" auto="yes" arch="*">
<unaffected range="ge">1.0.14</unaffected>
<vulnerable range="lt">1.0.14</vulnerable>
<p>nginx is a robust, small, and high performance HTTP and reverse proxy
<p>Multiple vulnerabilities have been found in nginx:</p>
<li>The TLS protocol does not properly handle session renegotiation
requests (CVE-2009-3555).
<li>The "ngx_http_process_request_headers()" function in ngx_http_parse.c
could cause a NULL pointer dereference (CVE-2009-3896).
<li>nginx does not properly sanitize user input for the the WebDAV COPY
or MOVE methods (CVE-2009-3898).
<li>The "ngx_resolver_copy()" function in ngx_resolver.c contains a
boundary error which could cause a heap-based buffer overflow
<li>nginx does not properly parse HTTP header responses which could
expose sensitive information (CVE-2012-1180).
<impact type="high">
<p>A remote attacker could possibly execute arbitrary code with the
privileges of the nginx process, cause a Denial of Service condition,
create or overwrite arbitrary files, or obtain sensitive information.
<p>There is no known workaround at this time.</p>
<p>All nginx users should upgrade to the latest version:</p>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=www-servers/nginx-1.0.14"
<uri link="">CVE-2009-3555
<uri link="">CVE-2009-3896
<uri link="">CVE-2009-3898
<uri link="">CVE-2011-4315
<uri link="">CVE-2012-1180
<metadata timestamp="Fri, 07 Oct 2011 23:37:49 +0000" tag="requester">craig</metadata>
<metadata timestamp="Wed, 28 Mar 2012 10:35:47 +0000" tag="submitter">ackle</metadata>