SB2013100601 - Gentoo update for nginx



SB2013100601 - Gentoo update for nginx

Published: October 6, 2013 Updated: September 25, 2016

Security Bulletin ID SB2013100601
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2013-0337)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files. AV:N per http://www.gentoo.org/security/en/glsa/glsa-201310-04.xml and per http://secunia.com/advisories/55181


2) Stack-based buffer overflow (CVE-ID: CVE-2013-2028)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the ngx_http_parse_chunked function in http/ngx_http_parse.c when processing a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2013-2070)

The vulnerability allows a remote non-authenticated attacker to #BASIC_IMPACT#.

http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.


Remediation

Install update from vendor's website.