Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2014-0133

Published: 28 March 2014

Heap-based buffer overflow in the SPDY implementation in nginx 1.3.15 before 1.4.7 and 1.5.x before 1.5.12 allows remote attackers to execute arbitrary code via a crafted request.

Notes

AuthorNote
mdeslaur
not affected as we build with --with-debug
seth-arnold
saucy was affected, not all flavors used --with-debug

Priority

Medium

Status

Package Release Status
nginx
Launchpad, Ubuntu, Debian
lucid Not vulnerable
(code not present)
precise Not vulnerable
(code not present)
quantal Not vulnerable
(code not present)
saucy
Released (1.4.1-3ubuntu1.3)
upstream
Released (1.4.7-1)
Patches:
upstream: http://nginx.org/download/patch.2014.spdy2.txt