Summary
The 'nginx' program is prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data.
Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.
Solution
Updates are available. Please see the references for more information.
References
Severity
Classification
-
CVE CVE-2009-3896 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:N/A:P
Related Vulnerabilities
- Aspen Sever Directory Traversal Vulnerability
- Home Web Server Graphical User Interface Remote Denial Of Service Vulnerability
- Cherokee Directory Traversal Vulnerability
- IBM WebSphere Application Server (WAS) Multiple Vulnerabilities 02 - March 2011
- Apache Tomcat Parameter Handling Denial of Service Vulnerability (Win)