The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (invalid pointer dereference and worker process crash) via a crafted UDP DNS response.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (invalid pointer dereference and worker process crash) via a crafted UDP DNS response.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://lists.opensuse.org/opensuse-updates/2016-02/msg00042.html | vendor-advisory x_refsource_SUSE |
https://bto.bluecoat.com/security-advisory/sa115 | x_refsource_CONFIRM |
https://security.gentoo.org/glsa/201606-06 | vendor-advisory x_refsource_GENTOO |
http://www.securitytracker.com/id/1034869 | vdb-entry x_refsource_SECTRACK |
http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html | mailing-list x_refsource_MLIST |
https://access.redhat.com/errata/RHSA-2016:1425 | vendor-advisory x_refsource_REDHAT |
http://www.debian.org/security/2016/dsa-3473 | vendor-advisory x_refsource_DEBIAN |
https://bugzilla.redhat.com/show_bug.cgi?id=1302587 | x_refsource_CONFIRM |
http://www.ubuntu.com/usn/USN-2892-1 | vendor-advisory x_refsource_UBUNTU |
https://support.apple.com/kb/HT212818 | x_refsource_CONFIRM |
http://seclists.org/fulldisclosure/2021/Sep/36 | mailing-list x_refsource_FULLDISC |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://lists.opensuse.org/opensuse-updates/2016-02/msg00042.html | vendor-advisory x_refsource_SUSE x_transferred |
https://bto.bluecoat.com/security-advisory/sa115 | x_refsource_CONFIRM x_transferred |
https://security.gentoo.org/glsa/201606-06 | vendor-advisory x_refsource_GENTOO x_transferred |
http://www.securitytracker.com/id/1034869 | vdb-entry x_refsource_SECTRACK x_transferred |
http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html | mailing-list x_refsource_MLIST x_transferred |
https://access.redhat.com/errata/RHSA-2016:1425 | vendor-advisory x_refsource_REDHAT x_transferred |
http://www.debian.org/security/2016/dsa-3473 | vendor-advisory x_refsource_DEBIAN x_transferred |
https://bugzilla.redhat.com/show_bug.cgi?id=1302587 | x_refsource_CONFIRM x_transferred |
http://www.ubuntu.com/usn/USN-2892-1 | vendor-advisory x_refsource_UBUNTU x_transferred |
https://support.apple.com/kb/HT212818 | x_refsource_CONFIRM x_transferred |
http://seclists.org/fulldisclosure/2021/Sep/36 | mailing-list x_refsource_FULLDISC x_transferred |
The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (invalid pointer dereference and worker process crash) via a crafted UDP DNS response.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 3.1 | 7.5 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Primary | 2.0 | 5.0 | MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
Hyperlink | Source | Resource |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2016-02/msg00042.html | secalert@redhat.com | Mailing List Third Party Advisory |
http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html | secalert@redhat.com | Vendor Advisory |
http://seclists.org/fulldisclosure/2021/Sep/36 | secalert@redhat.com | Mailing List Third Party Advisory |
http://www.debian.org/security/2016/dsa-3473 | secalert@redhat.com | Third Party Advisory |
http://www.securitytracker.com/id/1034869 | secalert@redhat.com | Third Party Advisory VDB Entry |
http://www.ubuntu.com/usn/USN-2892-1 | secalert@redhat.com | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2016:1425 | secalert@redhat.com | Third Party Advisory |
https://bto.bluecoat.com/security-advisory/sa115 | secalert@redhat.com | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1302587 | secalert@redhat.com | Issue Tracking Patch Third Party Advisory |
https://security.gentoo.org/glsa/201606-06 | secalert@redhat.com | Third Party Advisory |
https://support.apple.com/kb/HT212818 | secalert@redhat.com | Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2016-02/msg00042.html | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
http://seclists.org/fulldisclosure/2021/Sep/36 | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://www.debian.org/security/2016/dsa-3473 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://www.securitytracker.com/id/1034869 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory VDB Entry |
http://www.ubuntu.com/usn/USN-2892-1 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2016:1425 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
https://bto.bluecoat.com/security-advisory/sa115 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1302587 | af854a3a-2127-422b-91ae-364da2661108 | Issue Tracking Patch Third Party Advisory |
https://security.gentoo.org/glsa/201606-06 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
https://support.apple.com/kb/HT212818 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |