CVE-2014-0133
Published: 28 March 2014
Heap-based buffer overflow in the SPDY implementation in nginx 1.3.15 before 1.4.7 and 1.5.x before 1.5.12 allows remote attackers to execute arbitrary code via a crafted request.
Notes
Author | Note |
---|---|
mdeslaur | not affected as we build with --with-debug |
seth-arnold | saucy was affected, not all flavors used --with-debug |
Priority
Status
Package | Release | Status |
---|---|---|
nginx Launchpad, Ubuntu, Debian |
lucid |
Not vulnerable
(code not present)
|
precise |
Not vulnerable
(code not present)
|
|
quantal |
Not vulnerable
(code not present)
|
|
saucy |
Released
(1.4.1-3ubuntu1.3)
|
|
upstream |
Released
(1.4.7-1)
|
|
Patches: upstream: http://nginx.org/download/patch.2014.spdy2.txt |