First published: Mon May 13 2013(Updated: )
A similar security issue to <a href="https://access.redhat.com/security/cve/CVE-2013-2028">CVE-2013-2028</a> was identified [1] for versions of nginx if proxy_pass to untrusted upstream HTTP servers are used, which could lead to a denial of service or a disclosure of a worker process' memory. The problem affects nginx 1.1.4 - 1.2.8, 1.3.0 - 1.4.0 and was assigned the name <a href="https://access.redhat.com/security/cve/CVE-2013-2070">CVE-2013-2070</a>, so only Fedora 18 is affected. <a href="http://nginx.org/download/patch.2013.proxy.txt">http://nginx.org/download/patch.2013.proxy.txt</a> [1] <a href="http://www.openwall.com/lists/oss-security/2013/05/13/3">http://www.openwall.com/lists/oss-security/2013/05/13/3</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Nginx | >=1.1.4<=1.2.8 | |
F5 Nginx | >=1.3.9<=1.4.0 | |
Debian Debian Linux | =6.0 | |
Debian Debian Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.