Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-0746

Опубликовано: 15 фев. 2016
Источник: debian
EPSS Средний

Описание

Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
nginxfixed1.9.10-1package
nginxnot-affectedsqueezepackage

Примечания

  • http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html

  • https://github.com/nginx/nginx/commit/4b581a7c21e4328d059bf400a059c0458fc9f806 (release-1.9.10)

  • https://github.com/nginx/nginx/commit/a3d42258d97ebd0b638c20976654d3edfbaf943f (release-1.9.10)

EPSS

Процентиль: 94%
0.14006
Средний

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 10 лет назад

Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.

redhat
около 10 лет назад

Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.

CVSS3: 9.8
nvd
почти 10 лет назад

Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.

CVSS3: 9.8
github
больше 3 лет назад

Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.

suse-cvrf
около 10 лет назад

Security update for nginx

EPSS

Процентиль: 94%
0.14006
Средний