Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 03:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://mailman.nginx.org/pipermail/nginx-announce/2017/000200.html - Vendor Advisory | |
References | () http://seclists.org/fulldisclosure/2021/Sep/36 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/99534 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1039238 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2017:2538 - Third Party Advisory | |
References | () https://puppet.com/security/cve/cve-2017-7529 - Third Party Advisory | |
References | () https://support.apple.com/kb/HT212818 - Third Party Advisory |
Information
Published : 2017-07-13 13:29
Updated : 2024-11-21 03:32
NVD link : CVE-2017-7529
Mitre link : CVE-2017-7529
CVE.ORG link : CVE-2017-7529
JSON object : View
Products Affected
puppet
- puppet_enterprise
f5
- nginx
apple
- xcode
CWE
CWE-190
Integer Overflow or Wraparound