Vulnerability Name: | CVE-2012-1180 (CCN-74191) | ||||||||||||||||
Assigned: | 2012-03-15 | ||||||||||||||||
Published: | 2012-03-15 | ||||||||||||||||
Updated: | 2021-11-10 | ||||||||||||||||
Summary: | Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP servers to obtain sensitive information from process memory via a crafted backend response, in conjunction with a client request. | ||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N) 3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
| ||||||||||||||||
Vulnerability Type: | CWE-416 | ||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2012-1180 Source: FEDORA Type: Third Party Advisory FEDORA-2012-3846 Source: FEDORA Type: Third Party Advisory FEDORA-2012-3991 Source: FEDORA Type: Third Party Advisory FEDORA-2012-4006 Source: CONFIRM Type: Patch, Vendor Advisory http://nginx.org/download/patch.2012.memory.txt Source: CONFIRM Type: Patch, Vendor Advisory http://nginx.org/en/security_advisories.html Source: OSVDB Type: Broken Link 80124 Source: BUGTRAQ Type: Mailing List, Third Party Advisory 20120315 nginx fix for malformed HTTP responses from upstream servers Source: SECUNIA Type: Third Party Advisory 48465 Source: SECUNIA Type: Third Party Advisory 48577 Source: GENTOO Type: Third Party Advisory GLSA-201203-22 Source: CONFIRM Type: Patch, Vendor Advisory http://trac.nginx.org/nginx/changeset/4530/nginx Source: CONFIRM Type: Patch, Vendor Advisory http://trac.nginx.org/nginx/changeset/4531/nginx Source: DEBIAN Type: Third Party Advisory DSA-2434 Source: DEBIAN Type: DSA-2434 nginx -- sensitive information leak Source: MANDRIVA Type: Third Party Advisory MDVSA-2012:043 Source: CCN Type: nginx Web site nginx Source: MLIST Type: Mailing List, Patch, Third Party Advisory [oss-security] 20120315 CVE Request: nginx fix for malformed HTTP responses from upstream servers Source: MLIST Type: Mailing List, Patch, Third Party Advisory [oss-security] 20120315 Re: CVE Request: nginx fix for malformed HTTP responses from upstream servers Source: CCN Type: OSVDB ID: 80124 nginx HTTP Header Response Parsing Freed Memory Information Disclosure Source: BID Type: Third Party Advisory, VDB Entry 52578 Source: CCN Type: BID-52578 nginx 'ngx_cpystrn()' Information Disclosure Vulnerability Source: SECTRACK Type: Third Party Advisory, VDB Entry 1026827 Source: CCN Type: Red Hat Bugzilla Bug 803856 CVE-2012-1180 nginx: malformed HTTP response headers leads to information leak Source: MISC Type: Issue Tracking, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=803856 Source: XF Type: Third Party Advisory, VDB Entry nginx-ngxcpystrn-info-disclosure(74191) Source: XF Type: UNKNOWN nginx-ngxcpystrn-info-disclosure(74191) Source: SUSE Type: Broken Link openSUSE-SU-2012:0469 | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: ![]() | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |