ID CVE-2014-0133
Summary Heap-based buffer overflow in the SPDY implementation in nginx 1.3.15 before 1.4.7 and 1.5.x before 1.5.12 allows remote attackers to execute arbitrary code via a crafted request.
References
Vulnerable Configurations
  • cpe:2.3:a:f5:nginx:1.3.15:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:1.3.15:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:1.3.16:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:1.3.16:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:1.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:1.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:1.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:1.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:1.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:1.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:1.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:1.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:1.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:1.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:1.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:1.4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:1.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:1.4.6:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:1.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:1.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:1.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:1.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:1.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:1.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:1.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:1.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:1.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:1.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:1.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:1.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:1.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:1.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:1.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:1.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:1.5.8:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:1.5.8:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:1.5.9:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:1.5.9:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:1.5.10:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:1.5.10:*:*:*:*:*:*:*
  • cpe:2.3:a:f5:nginx:1.5.11:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:1.5.11:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 10-11-2021 - 15:59)
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 66537
mlist [nginx-announce] 20140318 nginx security advisory (CVE-2014-0133)
suse openSUSE-SU-2014:0450
Last major update 10-11-2021 - 15:59
Published 28-03-2014 - 15:55
Last modified 10-11-2021 - 15:59
Back to Top