CVE-2009-3896
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
24/11/2009
Last modified:
09/04/2025
Description
src/http/ngx_http_parse.c in nginx (aka Engine X) 0.1.0 through 0.4.14, 0.5.x before 0.5.38, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.14 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a long URI.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:f5:nginx:0.1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:f5:nginx:0.1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:f5:nginx:0.1.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:f5:nginx:0.1.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:f5:nginx:0.1.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:f5:nginx:0.1.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:f5:nginx:0.1.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:f5:nginx:0.1.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:f5:nginx:0.1.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:f5:nginx:0.1.9:*:*:*:*:*:*:* | ||
cpe:2.3:a:f5:nginx:0.1.10:*:*:*:*:*:*:* | ||
cpe:2.3:a:f5:nginx:0.1.11:*:*:*:*:*:*:* | ||
cpe:2.3:a:f5:nginx:0.1.12:*:*:*:*:*:*:* | ||
cpe:2.3:a:f5:nginx:0.1.13:*:*:*:*:*:*:* | ||
cpe:2.3:a:f5:nginx:0.1.14:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552035
- http://marc.info/?l=nginx&m=125692080328141&w=2
- http://secunia.com/advisories/48577
- http://security.debian.org/pool/updates/main/n/nginx/nginx_0.4.13-2+etch3.diff.gz
- http://security.gentoo.org/glsa/glsa-201203-22.xml
- http://sysoev.ru/nginx/patch.null.pointer.txt
- http://www.debian.org/security/2009/dsa-1920
- http://www.openwall.com/lists/oss-security/2009/11/20/1
- http://www.openwall.com/lists/oss-security/2009/11/20/6
- http://www.openwall.com/lists/oss-security/2009/11/23/10
- http://www.securityfocus.com/bid/36839
- https://bugzilla.redhat.com/show_bug.cgi?id=539565
- https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00428.html
- https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00442.html
- https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00449.html
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552035
- http://marc.info/?l=nginx&m=125692080328141&w=2
- http://secunia.com/advisories/48577
- http://security.debian.org/pool/updates/main/n/nginx/nginx_0.4.13-2+etch3.diff.gz
- http://security.gentoo.org/glsa/glsa-201203-22.xml
- http://sysoev.ru/nginx/patch.null.pointer.txt
- http://www.debian.org/security/2009/dsa-1920
- http://www.openwall.com/lists/oss-security/2009/11/20/1
- http://www.openwall.com/lists/oss-security/2009/11/20/6
- http://www.openwall.com/lists/oss-security/2009/11/23/10
- http://www.securityfocus.com/bid/36839
- https://bugzilla.redhat.com/show_bug.cgi?id=539565
- https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00428.html
- https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00442.html
- https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00449.html