First published: Sun Jun 06 2021(Updated: )
NGINX before 1.13.6 has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Nginx | <1.13.6 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-20005 is critical with a severity value of 9.8.
The affected software includes F5 Nginx versions up to and excluding 1.13.6, as well as Debian Debian Linux version 9.0.
CVE-2017-20005 can be exploited by a buffer overflow for years that exceed four digits, causing an integer overflow or false modification dates in the future.
To fix CVE-2017-20005, update to NGINX version 1.13.6 or higher or apply the necessary patches provided by the vendor.
You can find more information about CVE-2017-20005 at the following references: [http://nginx.org/en/CHANGES](http://nginx.org/en/CHANGES), [https://github.com/nginx/nginx/commit/0206ebe76f748bb39d9de4dd4b3fce777fdfdccf](https://github.com/nginx/nginx/commit/0206ebe76f748bb39d9de4dd4b3fce777fdfdccf), [https://github.com/nginx/nginx/commit/b900cc28fcbb4cf5a32ab62f80b59292e1c85b4b](https://github.com/nginx/nginx/commit/b900cc28fcbb4cf5a32ab62f80b59292e1c85b4b).