7.5
CVSSv2

CVE-2014-0133

Published: 28/03/2014 Updated: 10/11/2021
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in the SPDY implementation in nginx 1.3.15 prior to 1.4.7 and 1.5.x prior to 1.5.12 allows remote malicious users to execute arbitrary code via a crafted request.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

f5 nginx

opensuse opensuse 13.1

Vendor Advisories

Debian Bug report logs - #742059 nginx: CVE-2014-0133: SPDY heap buffer overflow Package: src:nginx; Maintainer for src:nginx is Debian Nginx Maintainers <pkg-nginx-maintainers@alioth-listsdebiannet>; Reported by: Henri Salo <henri@nervfi> Date: Tue, 18 Mar 2014 18:06:02 UTC Severity: grave Tags: fixed-upstream, s ...
Heap-based buffer overflow in the SPDY implementation in nginx 1315 before 147 and 15x before 1512 allows remote attackers to execute arbitrary code via a crafted request ...