SB2016070208 - Fedora EPEL 5 update for nginx
Published: July 2, 2016 Updated: April 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2011-4968)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
nginx http proxy module does not verify peer identity of https origin server which could facilitate man-in-the-middle attack (MITM)
2) NULL pointer dereference (CVE-ID: CVE-2016-0742)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within resolver in nginx when processing UDP DNS packets. A remote attacker can send a specially crafted UDP DNS response to the application and perform a denial of service (DoS) attack.
3) Use-after-free (CVE-ID: CVE-2016-0746)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing a crafted DNS response related to CNAME response processing within the resolver in nginx. A remote attacker can send a specially crafted DNS response to the affected server, trigger a use-after-free error and perform a denial of service attack or execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
4) Resource exhaustion (CVE-ID: CVE-2016-0747)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly limit the CNAME resolution within resolver component. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack by send a specially crafted DNS response.
5) Null pointer dereference in ngx_chain_to_iovec() (CVE-ID: CVE-2016-4450)
The vulnerability allows a remote attacker to cause denial of service conditions on the target system.
The vulnerability exists due to an access control error in the ngx_chain_to_iovec() function, when saving the client request body to a temporary file. A remote unauthenticated attacker can cause a null pointer dereference in the ngx_chain_to_iovec() function by sending specially crafted data.
Successful exploitation of this vulnerability may lead to the crash of a worker process.
Remediation
Install update from vendor's website.