CVE-2009-2629

Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests.
References
Link Resource
http://nginx.net/CHANGES Release Notes Vendor Advisory
http://nginx.net/CHANGES-0.5 Release Notes Vendor Advisory
http://nginx.net/CHANGES-0.6 Release Notes Vendor Advisory
http://nginx.net/CHANGES-0.7 Release Notes Vendor Advisory
http://sysoev.ru/nginx/patch.180065.txt Broken Link
http://www.debian.org/security/2009/dsa-1884 Third Party Advisory
http://www.kb.cert.org/vuls/id/180065 Third Party Advisory US Government Resource
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00428.html Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00442.html Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00449.html Third Party Advisory
http://nginx.net/CHANGES Release Notes Vendor Advisory
http://nginx.net/CHANGES-0.5 Release Notes Vendor Advisory
http://nginx.net/CHANGES-0.6 Release Notes Vendor Advisory
http://nginx.net/CHANGES-0.7 Release Notes Vendor Advisory
http://sysoev.ru/nginx/patch.180065.txt Broken Link
http://www.debian.org/security/2009/dsa-1884 Third Party Advisory
http://www.kb.cert.org/vuls/id/180065 Third Party Advisory US Government Resource
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00428.html Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00442.html Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00449.html Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*

History

21 Nov 2024, 01:05

Type Values Removed Values Added
References () http://nginx.net/CHANGES - Release Notes, Vendor Advisory () http://nginx.net/CHANGES - Release Notes, Vendor Advisory
References () http://nginx.net/CHANGES-0.5 - Release Notes, Vendor Advisory () http://nginx.net/CHANGES-0.5 - Release Notes, Vendor Advisory
References () http://nginx.net/CHANGES-0.6 - Release Notes, Vendor Advisory () http://nginx.net/CHANGES-0.6 - Release Notes, Vendor Advisory
References () http://nginx.net/CHANGES-0.7 - Release Notes, Vendor Advisory () http://nginx.net/CHANGES-0.7 - Release Notes, Vendor Advisory
References () http://sysoev.ru/nginx/patch.180065.txt - Broken Link () http://sysoev.ru/nginx/patch.180065.txt - Broken Link
References () http://www.debian.org/security/2009/dsa-1884 - Third Party Advisory () http://www.debian.org/security/2009/dsa-1884 - Third Party Advisory
References () http://www.kb.cert.org/vuls/id/180065 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/180065 - Third Party Advisory, US Government Resource
References () https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00428.html - Third Party Advisory () https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00428.html - Third Party Advisory
References () https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00442.html - Third Party Advisory () https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00442.html - Third Party Advisory
References () https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00449.html - Third Party Advisory () https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00449.html - Third Party Advisory

Information

Published : 2009-09-15 22:30

Updated : 2024-11-21 01:05


NVD link : CVE-2009-2629

Mitre link : CVE-2009-2629

CVE.ORG link : CVE-2009-2629


JSON object : View

Products Affected

debian

  • debian_linux

f5

  • nginx

fedoraproject

  • fedora
CWE
CWE-787

Out-of-bounds Write