SB2016070207 - Fedora EPEL 6 update for nginx



SB2016070207 - Fedora EPEL 6 update for nginx

Published: July 2, 2016 Updated: April 24, 2025

Security Bulletin ID SB2016070207
Severity
High
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 40% Medium 60%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2011-4968)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

nginx http proxy module does not verify peer identity of https origin server which could facilitate man-in-the-middle attack (MITM)


2) NULL pointer dereference (CVE-ID: CVE-2016-0742)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within resolver in nginx when processing UDP DNS packets. A remote attacker can send a specially crafted UDP DNS response to the application and perform a denial of service (DoS) attack.


3) Use-after-free (CVE-ID: CVE-2016-0746)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing a crafted DNS response related to CNAME response processing within the resolver in nginx. A remote attacker can send a specially crafted DNS response to the affected server, trigger a use-after-free error and perform a denial of service attack or execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


4) Resource exhaustion (CVE-ID: CVE-2016-0747)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly limit the CNAME resolution within resolver component. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack by send a specially crafted DNS response.


5) Null pointer dereference in ngx_chain_to_iovec() (CVE-ID: CVE-2016-4450)

The vulnerability allows a remote attacker to cause denial of service conditions on the target system.

The vulnerability exists due to an access control error in the ngx_chain_to_iovec() function, when saving the client request body to a temporary file. A remote unauthenticated attacker can cause a null pointer dereference in the ngx_chain_to_iovec() function by sending specially crafted data.

Successful exploitation of this vulnerability may lead to the crash of a worker process.


Remediation

Install update from vendor's website.