First published: Tue Nov 29 2016(Updated: )
The nginx package before 1.6.2-5+deb8u3 on Debian jessie, the nginx packages before 1.4.6-1ubuntu3.6 on Ubuntu 14.04 LTS, before 1.10.0-0ubuntu0.16.04.3 on Ubuntu 16.04 LTS, and before 1.10.1-0ubuntu1.1 on Ubuntu 16.10, and the nginx ebuild before 1.10.2-r3 on Gentoo allow local users with access to the web server user account to gain root privileges via a symlink attack on the error log.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
F5 NGINX App Protect | <=1.10.1 | |
Ubuntu | =16.10 | |
F5 NGINX App Protect | <=1.10.0 | |
Ubuntu | =16.04 | |
F5 NGINX App Protect | <=1.6.2 | |
Debian | =8.0 | |
F5 NGINX App Protect | <=1.4.3 | |
Ubuntu | =14.04 | |
Fedora | =33 | |
Fedora | =34 | |
Fedora | =35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1247 is classified as a critical vulnerability that allows local users to escalate privileges.
To fix CVE-2016-1247, upgrade the nginx package to the latest version available for your operating system that is not affected.
CVE-2016-1247 affects nginx versions before 1.6.2-5+deb8u3 on Debian and variations on Ubuntu up to version 1.10.1.
CVE-2016-1247 is not a remote vulnerability; it requires local user access to exploit.
CVE-2016-1247 affects Debian Jessie, Ubuntu 14.04 LTS, and Ubuntu 16.04 LTS among others.