view xml/en/security_advisories.xml @ 1009:135920b5c61d

Marked strings with entities in japanese translation as literal. This allows to preserve information and produce correct output if the XML parser expands entities on input. The markup is similar to english and russian versions of the document.
author Vladimir Homutov <vl@nginx.com>
date Mon, 11 Nov 2013 11:54:16 +0400
parents ef5485fb932d
children f7fe7da742c6
line wrap: on
line source

<!--
  Copyright (C) Igor Sysoev
  Copyright (C) Nginx, Inc.
  -->

<!DOCTYPE article SYSTEM "../../dtd/article.dtd">

<article name="nginx security advisories"
         link="/en/security_advisories.html"
         lang="en"
         rev="1">

<section>

<para>
All nginx security issues should be reported to
<link url="mailto:security-alert@nginx.org">security-alert@nginx.org</link>.
</para>

<para>
Patches are signed using one of the
<link doc="pgp_keys.xml">PGP public keys</link>.
</para>

<security>

<item name="Memory disclosure with specially crafted HTTP backend responses"
      severity="medium"
      advisory="http://mailman.nginx.org/pipermail/nginx-announce/2013/000114.html"
      cve="2013-2070"
      good="1.5.0+, 1.4.1+, 1.2.9+"
      vulnerable="1.1.4-1.2.8, 1.3.9-1.4.0">
<patch name="patch.2013.chunked.txt" versions="1.3.9-1.4.0" />
<patch name="patch.2013.proxy.txt" versions="1.1.4-1.2.8" />
</item>

<item name="Stack-based buffer overflow with specially crafted request"
      severity="major"
      advisory="http://mailman.nginx.org/pipermail/nginx-announce/2013/000112.html"
      cve="2013-2028"
      good="1.5.0+, 1.4.1+"
      vulnerable="1.3.9-1.4.0">
<patch name="patch.2013.chunked.txt" />
</item>

<item name="Vulnerabilities with Windows directory aliases"
      severity="medium"
      advisory="http://mailman.nginx.org/pipermail/nginx-announce/2012/000086.html"
      cve="2011-4963"
      good="1.3.1+, 1.2.1+"
      vulnerable="nginx/Windows 0.7.52-1.3.0" />

<item name="Buffer overflow in the ngx_http_mp4_module"
      severity="major"
      advisory="http://mailman.nginx.org/pipermail/nginx-announce/2012/000080.html"
      cve="2012-2089"
      good="1.1.19+, 1.0.15+"
      vulnerable="1.1.3-1.1.18, 1.0.7-1.0.14">
<patch name="patch.2012.mp4.txt" />
</item>

<item name="Memory disclosure with specially crafted backend responses"
      severity="major"
      advisory="http://mailman.nginx.org/pipermail/nginx-announce/2012/000076.html"
      cve="2012-1180"
      good="1.1.17+, 1.0.14+"
      vulnerable="0.1.0-1.1.16">
<patch name="patch.2012.memory.txt" />
</item>

<item name="Buffer overflow in resolver"
      severity="medium"
      cve="2011-4315"
      good="1.1.8+, 1.0.10+"
      vulnerable="0.6.18-1.1.7" />

<item name="Vulnerabilities with invalid UTF-8 sequence on Windows"
      severity="major"
      cve="2010-2266"
      good="0.8.41+, 0.7.67+"
      vulnerable="nginx/Windows 0.7.52-0.8.40" />

<item name="Vulnerabilities with Windows file default stream"
      severity="major"
      cve="2010-2263"
      good="0.8.40+, 0.7.66+"
      vulnerable="nginx/Windows 0.7.52-0.8.39" />

<item name="Vulnerabilities with Windows 8.3 filename pseudonyms"
      severity="major"
      core="CORE-2010-0121"
      href="http://www.coresecurity.com/content/filename-pseudonyms-vulnerabilities"
      good="0.8.33+, 0.7.65+"
      vulnerable="nginx/Windows 0.7.52-0.8.32" />

<item name="An error log data are not sanitized"
      severity="none"
      cve="2009-4487"
      good="none"
      vulnerable="all" />

<item name="The renegotiation vulnerability in SSL protocol"
      severity="major"
      cert="120541"
      cve="2009-3555"
      good="0.8.23+, 0.7.64+"
      vulnerable="0.1.0-0.8.22">
<patch name="patch.cve-2009-3555.txt" />
</item>

<item name="Directory traversal vulnerability"
      severity="minor"
      cve="2009-3898"
      good="0.8.17+, 0.7.63+"
      vulnerable="0.1.0-0.8.16" />

<item name="Buffer underflow vulnerability"
      severity="major"
      cert="180065"
      cve="2009-2629"
      good="0.8.15+, 0.7.62+, 0.6.39+, 0.5.38+"
      vulnerable="0.1.0-0.8.14">
<patch name="patch.180065.txt" />
</item>

<item name="Null pointer dereference vulnerability"
      severity="major"
      cve="2009-3896"
      good="0.8.14+, 0.7.62+, 0.6.39+, 0.5.38+"
      vulnerable="0.1.0-0.8.13">
<patch name="patch.null.pointer.txt" />
</item>

</security>

</section>

</article>