CVE-2009-3896

src/http/ngx_http_parse.c in nginx (aka Engine X) 0.1.0 through 0.4.14, 0.5.x before 0.5.38, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.14 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a long URI.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552035 Exploit
http://marc.info/?l=nginx&m=125692080328141&w=2
http://secunia.com/advisories/48577
http://security.debian.org/pool/updates/main/n/nginx/nginx_0.4.13-2+etch3.diff.gz
http://security.gentoo.org/glsa/glsa-201203-22.xml
http://sysoev.ru/nginx/patch.null.pointer.txt Patch
http://www.debian.org/security/2009/dsa-1920
http://www.openwall.com/lists/oss-security/2009/11/20/1 Patch
http://www.openwall.com/lists/oss-security/2009/11/20/6 Patch
http://www.openwall.com/lists/oss-security/2009/11/23/10 Patch
http://www.securityfocus.com/bid/36839 Exploit Patch
https://bugzilla.redhat.com/show_bug.cgi?id=539565 Patch
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00428.html
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00442.html
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00449.html
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552035 Exploit
http://marc.info/?l=nginx&m=125692080328141&w=2
http://secunia.com/advisories/48577
http://security.debian.org/pool/updates/main/n/nginx/nginx_0.4.13-2+etch3.diff.gz
http://security.gentoo.org/glsa/glsa-201203-22.xml
http://sysoev.ru/nginx/patch.null.pointer.txt Patch
http://www.debian.org/security/2009/dsa-1920
http://www.openwall.com/lists/oss-security/2009/11/20/1 Patch
http://www.openwall.com/lists/oss-security/2009/11/20/6 Patch
http://www.openwall.com/lists/oss-security/2009/11/23/10 Patch
http://www.securityfocus.com/bid/36839 Exploit Patch
https://bugzilla.redhat.com/show_bug.cgi?id=539565 Patch
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00428.html
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00442.html
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00449.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:f5:nginx:0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.3:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.4:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.6:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.7:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.8:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.9:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.10:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.11:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.12:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.13:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.14:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.15:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.16:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.17:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.18:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.19:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.20:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.21:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.22:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.23:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.24:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.25:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.26:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.27:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.28:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.29:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.30:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.31:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.32:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.33:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.34:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.35:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.36:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.37:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.38:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.39:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.40:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.41:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.42:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.43:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.44:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.1.45:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.2.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.2.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.2.3:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.2.4:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.2.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.2.6:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.3:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.4:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.6:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.7:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.8:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.9:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.10:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.11:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.12:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.13:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.14:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.15:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.16:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.17:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.18:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.19:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.20:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.21:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.22:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.23:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.24:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.25:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.26:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.27:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.28:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.29:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.30:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.31:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.32:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.33:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.34:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.35:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.36:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.37:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.38:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.39:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.40:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.41:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.42:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.43:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.44:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.45:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.46:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.47:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.48:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.49:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.50:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.51:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.52:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.53:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.54:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.55:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.56:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.57:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.58:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.59:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.60:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.3.61:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.4.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.4.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.4.3:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.4.4:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.4.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.4.6:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.4.7:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.4.8:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.4.9:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.4.10:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.4.11:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.4.12:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.4.13:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.3:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.4:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.6:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.7:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.8:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.9:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.10:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.11:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.12:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.13:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.14:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.15:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.16:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.17:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.18:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.19:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.20:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.21:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.22:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.23:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.24:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.25:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.26:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.27:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.28:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.29:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.30:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.31:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.32:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.33:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.34:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.35:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.36:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.5.37:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.3:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.4:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.6:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.7:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.8:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.9:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.10:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.11:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.12:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.13:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.14:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.15:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.17:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.18:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.19:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.20:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.21:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.22:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.23:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.24:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.25:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.26:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.27:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.28:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.29:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.30:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.31:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.32:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.33:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.34:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.35:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.36:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.37:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.6.38:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.3:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.4:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.6:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.7:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.8:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.9:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.10:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.11:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.12:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.13:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.14:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.15:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.16:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.17:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.18:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.19:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.20:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.21:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.22:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.23:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.24:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.25:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.26:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.27:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.28:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.29:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.30:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.31:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.32:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.33:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.34:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.35:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.36:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.37:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.38:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.39:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.40:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.41:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.42:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.43:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.44:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.45:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.46:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.47:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.48:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.49:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.50:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.51:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.52:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.53:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.54:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.55:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.56:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.57:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.58:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.59:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.60:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.7.61:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.8.3:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.8.4:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.8.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.8.6:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.8.7:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.8.8:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.8.9:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.8.10:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.8.11:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.8.12:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.8.13:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:0.8.14:*:*:*:*:*:*:*
cpe:2.3:a:nginx:nginx:0.6.1516:*:*:*:*:*:*:*

History

21 Nov 2024, 01:08

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552035 - Exploit () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552035 - Exploit
References () http://marc.info/?l=nginx&m=125692080328141&w=2 - () http://marc.info/?l=nginx&m=125692080328141&w=2 -
References () http://secunia.com/advisories/48577 - () http://secunia.com/advisories/48577 -
References () http://security.debian.org/pool/updates/main/n/nginx/nginx_0.4.13-2+etch3.diff.gz - () http://security.debian.org/pool/updates/main/n/nginx/nginx_0.4.13-2+etch3.diff.gz -
References () http://security.gentoo.org/glsa/glsa-201203-22.xml - () http://security.gentoo.org/glsa/glsa-201203-22.xml -
References () http://sysoev.ru/nginx/patch.null.pointer.txt - Patch () http://sysoev.ru/nginx/patch.null.pointer.txt - Patch
References () http://www.debian.org/security/2009/dsa-1920 - () http://www.debian.org/security/2009/dsa-1920 -
References () http://www.openwall.com/lists/oss-security/2009/11/20/1 - Patch () http://www.openwall.com/lists/oss-security/2009/11/20/1 - Patch
References () http://www.openwall.com/lists/oss-security/2009/11/20/6 - Patch () http://www.openwall.com/lists/oss-security/2009/11/20/6 - Patch
References () http://www.openwall.com/lists/oss-security/2009/11/23/10 - Patch () http://www.openwall.com/lists/oss-security/2009/11/23/10 - Patch
References () http://www.securityfocus.com/bid/36839 - Exploit, Patch () http://www.securityfocus.com/bid/36839 - Exploit, Patch
References () https://bugzilla.redhat.com/show_bug.cgi?id=539565 - Patch () https://bugzilla.redhat.com/show_bug.cgi?id=539565 - Patch
References () https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00428.html - () https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00428.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00442.html - () https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00442.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00449.html - () https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00449.html -

Information

Published : 2009-11-24 17:30

Updated : 2024-11-21 01:08


NVD link : CVE-2009-3896

Mitre link : CVE-2009-3896

CVE.ORG link : CVE-2009-3896


JSON object : View

Products Affected

f5

  • nginx

nginx

  • nginx
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer