Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Web Server/CGI)  >   nginx Vendors:
nginx Bug Lets Remote Users Deny Service or Obtain Potentially Sensitive Information
SecurityTracker Alert ID:  1028544
SecurityTracker URL:
CVE Reference:   CVE-2013-2070   (Links to External Site)
Date:  May 13 2013
Impact:   Denial of service via network, Disclosure of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.1.4 - 1.2.8, 1.3.0 - 1.4.0
Description:   A vulnerability was reported in nginx. A remote user can cause denial of service conditions or obtain potentially sensitive information.

On systems where proxy_pass is used with untrusted upstream HTTP servers, a remote upstream proxied server can return a specially crafted response to cause denial of service conditions or disclose potentially sensitive information.

The vulnerability resides in 'src/http/modules/ngx_http_proxy_module.c' and is related to CVE-2013-2028 (Alert ID 1028519).

Impact:   A remote user can cause denial of service conditions.

A remote user can obtain potentially sensitive information.

Solution:   The vendor has issued a fix (1.2.9, 1.4.1, 1.5.0).
Vendor URL: (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any)

Message History:   None.

 Source Message Contents

Subject:  [oss-security] nginx security advisory (CVE-2013-2070)


A security problem related to CVE-2013-2028 was identified,
affecting some previous nginx versions if proxy_pass to 
untrusted upstream HTTP servers is used.

The problem may lead to a denial of service or a disclosure of a
worker process memory on a specially crafted response from an
upstream proxied server.

The problem affects nginx 1.1.4 - 1.2.8, 1.3.0 - 1.4.0.

The problem is already fixed in nginx 1.5.0, 1.4.1.  Version 1.2.9
was released to address the issue in the 1.2.x legacy branch.

Patch for nginx 1.3.9 - 1.4.0 is the same as for CVE-2013-2028:

Patch for older nginx versions (1.1.4 - 1.2.8, 1.3.0 - 1.3.8)
can be found here:

Andrew Alexeev
Nginx, Inc.


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC