Vulnerability Description
Heap-based buffer overflow in the SPDY implementation in nginx 1.3.15 before 1.4.7 and 1.5.x before 1.5.12 allows remote attackers to execute arbitrary code via a crafted request.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| F5 | Nginx | >= 1.3.15, < 1.4.7 |
| Opensuse | Opensuse | 13.1 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00095.htmlMailing ListThird Party Advisory
- http://mailman.nginx.org/pipermail/nginx-announce/2014/000135.htmlVendor Advisory
- http://www.securityfocus.com/bid/66537Third Party AdvisoryVDB Entry
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00095.htmlMailing ListThird Party Advisory
- http://mailman.nginx.org/pipermail/nginx-announce/2014/000135.htmlVendor Advisory
- http://www.securityfocus.com/bid/66537Third Party AdvisoryVDB Entry
FAQ
What is CVE-2014-0133?
CVE-2014-0133 is a vulnerability with a CVSS score of 7.5 (HIGH). Heap-based buffer overflow in the SPDY implementation in nginx 1.3.15 before 1.4.7 and 1.5.x before 1.5.12 allows remote attackers to execute arbitrary code via a crafted request.
How severe is CVE-2014-0133?
CVE-2014-0133 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-0133?
Check the references section above for vendor advisories and patch information. Affected products include: F5 Nginx, Opensuse Opensuse.