Vulnerability Name:

CVE-2009-2629 (CCN-53250)

Assigned:2009-09-14
Published:2009-09-14
Updated:2021-11-10
Summary:Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-787
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2009-2629

Source: CCN
Type: nginx Web site
Changes with nginx-0.7.62

Source: CONFIRM
Type: Release Notes, Vendor Advisory
http://nginx.net/CHANGES

Source: CONFIRM
Type: Release Notes, Vendor Advisory
http://nginx.net/CHANGES-0.5

Source: CONFIRM
Type: Release Notes, Vendor Advisory
http://nginx.net/CHANGES-0.6

Source: CONFIRM
Type: Release Notes, Vendor Advisory
http://nginx.net/CHANGES-0.7

Source: CCN
Type: SA36751
nginx "ngx_http_parse_complex_uri()" Buffer Underflow

Source: CONFIRM
Type: Broken Link
http://sysoev.ru/nginx/patch.180065.txt

Source: DEBIAN
Type: Third Party Advisory
DSA-1884

Source: DEBIAN
Type: DSA-1884
nginx -- buffer underflow

Source: CCN
Type: GLSA-200909-18
nginx: Remote execution of arbitrary code

Source: CCN
Type: US-CERT VU#180065
Nginx ngx_http_parse_complex_uri() buffer underflow vulnerability

Source: CERT-VN
Type: Third Party Advisory, US Government Resource
VU#180065

Source: CCN
Type: OSVDB ID: 58128
nginx ngx_http_parse_complex_uri() Function Underflow

Source: CCN
Type: BID-36384
nginx HTTP Request Remote Buffer Overflow Vulnerability

Source: XF
Type: UNKNOWN
nginx-httpparsecomplexuri-code-execution(53250)

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [08-28-2010]

Source: FEDORA
Type: Third Party Advisory
FEDORA-2009-12750

Source: FEDORA
Type: Third Party Advisory
FEDORA-2009-12775

Source: FEDORA
Type: Third Party Advisory
FEDORA-2009-12782

Vulnerable Configuration:Configuration 1:
  • cpe:/a:f5:nginx:*:*:*:*:*:*:*:* (Version >= 0.1.0 and < 0.5.38)
  • OR cpe:/a:f5:nginx:*:*:*:*:*:*:*:* (Version >= 0.6.0 and < 0.6.39)
  • OR cpe:/a:f5:nginx:*:*:*:*:*:*:*:* (Version >= 0.7.0 and < 0.7.62)
  • OR cpe:/a:f5:nginx:*:*:*:*:*:*:*:* (Version >= 0.8.0 and < 0.8.15)

  • Configuration 2:
  • cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:6.0:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:fedoraproject:fedora:10:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:11:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:12:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:7674
    P
    DSA-1884 nginx -- buffer underflow
    2014-06-23
    oval:org.mitre.oval:def:13138
    P
    DSA-1884-1 nginx -- buffer underflow
    2014-06-23
    oval:org.debian:def:1884
    V
    buffer underflow
    2009-09-14
    BACK
    f5 nginx *
    f5 nginx *
    f5 nginx *
    f5 nginx *
    debian debian linux 4.0
    debian debian linux 5.0
    debian debian linux 6.0
    fedoraproject fedora 10
    fedoraproject fedora 11
    fedoraproject fedora 12