Integer Overflow or Wraparound Affecting nginx package, versions <1.6.2-5+deb8u5


0.0
high

Snyk CVSS

    Attack Complexity Low
    Confidentiality High

    Threat Intelligence

    EPSS 96.28% (100th percentile)
Expand this section
NVD
7.5 high
Expand this section
Red Hat
5.3 medium

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-DEBIAN8-NGINX-340987
  • published 13 Jul 2017
  • disclosed 13 Jul 2017

How to fix?

Upgrade Debian:8 nginx to version 1.6.2-5+deb8u5 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream nginx package and not the nginx package as distributed by Debian. See How to fix? for Debian:8 relevant fixed versions and status.

Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.