|Title:||nginx HTTP Request Remote Buffer Overflow Vulnerability|
|Summary:||Determine if nginx is prone to a buffer-overflow vulnerability|
The 'nginx' program is prone to a buffer-overflow vulnerability
because the application fails to perform adequate boundary checks on
Attackers can exploit this issue to execute arbitrary code within the
context of the affected application. Failed exploit attempts will
result in a denial-of-service condition.
Updates are available. Please see the references for more information.
BugTraq ID: 36384|
Common Vulnerability Exposure (CVE) ID: CVE-2009-2629
Debian Security Information: DSA-1884 (Google Search)
CERT/CC vulnerability note: VU#180065
|Copyright||This script is Copyright (C) 2009 Greenbone Networks GmbH|
|This is only one of 40246 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.