First published: Tue Sep 15 2009(Updated: )
Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
F5 NGINX | >=0.1.0<0.5.38 | |
F5 NGINX | >=0.6.0<0.6.39 | |
F5 NGINX | >=0.7.0<0.7.62 | |
F5 NGINX | >=0.8.0<0.8.15 | |
Debian | =4.0 | |
Debian | =5.0 | |
Debian | =6.0 | |
Fedora | =10 | |
Fedora | =11 | |
Fedora | =12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2629 has a high severity due to the potential for remote attackers to execute arbitrary code.
To fix CVE-2009-2629, update nginx to versions 0.6.39, 0.7.62, 0.8.15 or later.
CVE-2009-2629 affects nginx versions from 0.1.0 to 0.5.37, and several versions in the 0.6.x, 0.7.x, and 0.8.x series prior to specified patches.
Yes, CVE-2009-2629 can be exploited remotely through crafted HTTP requests.
CVE-2009-2629 is a buffer underflow vulnerability.