CVE-2017-7529
Publication date 11 July 2017
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
Status
Package | Ubuntu Release | Status |
---|---|---|
nginx | ||
16.04 LTS xenial |
Fixed 1.10.3-0ubuntu0.16.04.2
|
|
14.04 LTS trusty |
Fixed 1.4.6-1ubuntu3.8
|
Notes
sbeattie
from the nginx announcement, the following configuration can be used as a temporary workaround: max_ranges 1;
Patch details
Package | Patch details |
---|---|
nginx |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-3352-1
- nginx vulnerability
- 13 July 2017