#VU42707 Stack-based buffer overflow in nginx - CVE-2013-2028 

 

#VU42707 Stack-based buffer overflow in nginx - CVE-2013-2028

Published: July 20, 2013 / Updated: December 23, 2020


Vulnerability identifier: #VU42707
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:A/U:Green
CVE-ID: CVE-2013-2028
CWE-ID: CWE-121
Exploitation vector: Remote access
Exploit availability: Public exploit is available
Vulnerable software:
nginx
Software vendor:
F5 Networks

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the ngx_http_parse_chunked function in http/ngx_http_parse.c when processing a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.

External links