[USN-3352-1] nginx vulnerability
Severity
Medium
Affected Packages
16
CVEs
1
nginx could be made to expose sensitive information over the network.
It was discovered that an integer overflow existed in the range filter
feature of nginx. A remote attacker could use this to expose
sensitive information.
- ID
- USN-3352-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-3352-1
- Published
-
2017-07-13T18:38:55
(7 years ago) - Modified
-
2017-07-13T18:38:55
(7 years ago) - Other Advisories
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/nginx?distro=xenial | ubuntu | nginx | < 1.10.3-0ubuntu0.16.04.2 | xenial | ||
Affected | pkg:deb/ubuntu/nginx?distro=trusty | ubuntu | nginx | < 1.4.6-1ubuntu3.8 | trusty | ||
Affected | pkg:deb/ubuntu/nginx-naxsi?distro=trusty | ubuntu | nginx-naxsi | < 1.4.6-1ubuntu3.8 | trusty | ||
Affected | pkg:deb/ubuntu/nginx-naxsi-ui?distro=trusty | ubuntu | nginx-naxsi-ui | < 1.4.6-1ubuntu3.8 | trusty | ||
Affected | pkg:deb/ubuntu/nginx-light?distro=xenial | ubuntu | nginx-light | < 1.10.3-0ubuntu0.16.04.2 | xenial | ||
Affected | pkg:deb/ubuntu/nginx-light?distro=trusty | ubuntu | nginx-light | < 1.4.6-1ubuntu3.8 | trusty | ||
Affected | pkg:deb/ubuntu/nginx-full?distro=xenial | ubuntu | nginx-full | < 1.10.3-0ubuntu0.16.04.2 | xenial | ||
Affected | pkg:deb/ubuntu/nginx-full?distro=trusty | ubuntu | nginx-full | < 1.4.6-1ubuntu3.8 | trusty | ||
Affected | pkg:deb/ubuntu/nginx-extras?distro=xenial | ubuntu | nginx-extras | < 1.10.3-0ubuntu0.16.04.2 | xenial | ||
Affected | pkg:deb/ubuntu/nginx-extras?distro=trusty | ubuntu | nginx-extras | < 1.4.6-1ubuntu3.8 | trusty | ||
Affected | pkg:deb/ubuntu/nginx-doc?distro=xenial | ubuntu | nginx-doc | < 1.10.3-0ubuntu0.16.04.2 | xenial | ||
Affected | pkg:deb/ubuntu/nginx-doc?distro=trusty | ubuntu | nginx-doc | < 1.4.6-1ubuntu3.8 | trusty | ||
Affected | pkg:deb/ubuntu/nginx-core?distro=xenial | ubuntu | nginx-core | < 1.10.3-0ubuntu0.16.04.2 | xenial | ||
Affected | pkg:deb/ubuntu/nginx-core?distro=trusty | ubuntu | nginx-core | < 1.4.6-1ubuntu3.8 | trusty | ||
Affected | pkg:deb/ubuntu/nginx-common?distro=xenial | ubuntu | nginx-common | < 1.10.3-0ubuntu0.16.04.2 | xenial | ||
Affected | pkg:deb/ubuntu/nginx-common?distro=trusty | ubuntu | nginx-common | < 1.4.6-1ubuntu3.8 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |