Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://openwall.com/lists/oss-security/2011/11/17/10 | patch mailing list third party advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2011-December/070569.html | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00005.html | vendor advisory mailing list third party advisory |
http://www.nginx.org/en/CHANGES-1.0 | release notes vendor advisory |
http://trac.nginx.org/nginx/changeset/4268/nginx | patch vendor advisory issue tracking |
http://openwall.com/lists/oss-security/2011/11/17/8 | patch mailing list third party advisory |
http://secunia.com/advisories/48577 | third party advisory |
http://secunia.com/advisories/47097 | third party advisory |
http://security.gentoo.org/glsa/glsa-201203-22.xml | third party advisory vendor advisory |
http://www.securityfocus.com/bid/50710 | third party advisory vdb entry |