Summary
The host is running Nginx and is prone stack buffer overflow vulnerability.
Impact
Successful exploitation will let the remote unauthenticated attackers to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.
Impact Level: System/Application
Solution
Upgrade to Nginx version 1.5.0, 1.4.1 or later,
http://nginx.org/
Insight
A stack-based buffer overflow will occur in a worker process while handling certain chunked transfer encoding requests.
Affected
Nginx version 1.3.9 through 1.4.0
References
Severity
Classification
-
CVE CVE-2013-2028 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Adobe Reader '/Registry' and '/Ordering' Buffer Overflow Vulnerability (Win)
- Adobe Reader Integer Overflow Vulnerability - Jan 12 (Linux)
- Adobe Reader 'Plug-in' Buffer Overflow Vulnerability (Windows)
- Alpine tmail and dmail Buffer Overflow Vulnerabilities (Win)
- Adobe Reader 'Plug-in' Buffer Overflow Vulnerability (Linux)