First published: Mon May 13 2013(Updated: )
A similar security issue to <a href="https://access.redhat.com/security/cve/CVE-2013-2028">CVE-2013-2028</a> was identified [1] for versions of nginx if proxy_pass to untrusted upstream HTTP servers are used, which could lead to a denial of service or a disclosure of a worker process' memory. The problem affects nginx 1.1.4 - 1.2.8, 1.3.0 - 1.4.0 and was assigned the name <a href="https://access.redhat.com/security/cve/CVE-2013-2070">CVE-2013-2070</a>, so only Fedora 18 is affected. <a href="http://nginx.org/download/patch.2013.proxy.txt">http://nginx.org/download/patch.2013.proxy.txt</a> [1] <a href="http://www.openwall.com/lists/oss-security/2013/05/13/3">http://www.openwall.com/lists/oss-security/2013/05/13/3</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Nginx | >=1.1.4<=1.2.8>=1.3.0<=1.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-962525 is considered high due to its potential to cause denial of service and memory disclosure.
REDHAT-BUG-962525 affects Nginx versions between 1.1.4 and 1.2.8, as well as between 1.3.0 and 1.4.0.
To fix REDHAT-BUG-962525, update your Nginx installation to a version that is not affected by this vulnerability.
REDHAT-BUG-962525 can facilitate denial of service attacks and unauthorized memory disclosures from Nginx worker processes.
A recommended workaround for REDHAT-BUG-962525 is to avoid using proxy_pass with untrusted upstream HTTP servers.