First published: Mon May 13 2013(Updated: )
A similar security issue to <a href="https://access.redhat.com/security/cve/CVE-2013-2028">CVE-2013-2028</a> was identified [1] for versions of nginx if proxy_pass to untrusted upstream HTTP servers are used, which could lead to a denial of service or a disclosure of a worker process' memory. The problem affects nginx 1.1.4 - 1.2.8, 1.3.0 - 1.4.0 and was assigned the name <a href="https://access.redhat.com/security/cve/CVE-2013-2070">CVE-2013-2070</a>, so only Fedora 18 is affected. <a href="http://nginx.org/download/patch.2013.proxy.txt">http://nginx.org/download/patch.2013.proxy.txt</a> [1] <a href="http://www.openwall.com/lists/oss-security/2013/05/13/3">http://www.openwall.com/lists/oss-security/2013/05/13/3</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nginx | >=1.1.4<=1.2.8 | |
Nginx | >=1.3.9<=1.4.0 | |
Debian | =6.0 | |
Debian | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2070 is classified as a medium severity vulnerability.
To fix CVE-2013-2070, upgrade nginx to a version that is not affected by the vulnerability.
CVE-2013-2070 affects nginx versions from 1.1.4 to 1.2.8 and 1.3.9 to 1.4.0.
CVE-2013-2070 can lead to denial of service and potential disclosure of a worker process' memory.
CVE-2013-2070 impacts Debian GNU/Linux versions 6.0 and 7.0.