First published: Fri Mar 28 2014(Updated: )
Heap-based buffer overflow in the SPDY implementation in nginx 1.3.15 before 1.4.7 and 1.5.x before 1.5.12 allows remote attackers to execute arbitrary code via a crafted request.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 NGINX App Protect | >=1.3.15<1.4.7 | |
F5 NGINX App Protect | >=1.5.0<=1.5.11 | |
openSUSE | =13.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0133 has a severity rating that indicates it could allow remote attackers to execute arbitrary code.
To fix CVE-2014-0133, update nginx to version 1.4.7 or later, or to version 1.5.12 or later.
CVE-2014-0133 affects nginx versions 1.3.15 through 1.4.6 and versions 1.5.0 through 1.5.11.
CVE-2014-0133 is classified as a heap-based buffer overflow vulnerability.
Yes, CVE-2014-0133 can be exploited by remote attackers through a crafted request.