7.5
CVSSv3

CVE-2016-0742

Published: 15/02/2016 Updated: 15/12/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The resolver in nginx prior to 1.8.1 and 1.9.x prior to 1.9.10 allows remote malicious users to cause a denial of service (invalid pointer dereference and worker process crash) via a crafted UDP DNS response.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

f5 nginx

canonical ubuntu linux 14.04

canonical ubuntu linux 15.10

debian debian linux 7.0

debian debian linux 8.0

debian debian linux 9.0

opensuse leap 42.1

apple xcode

redhat software collections 1.0

Vendor Advisories

Several security issues were fixed in nginx ...
Debian Bug report logs - #812806 nginx: resolver CVEs: CVE-2016-0742 CVE-2016-0746 CVE-2016-0747 Package: src:nginx; Maintainer for src:nginx is Debian Nginx Maintainers <pkg-nginx-maintainers@alioth-listsdebiannet>; Reported by: Christos Trochalakis <yatiohi@ideopolisgr> Date: Tue, 26 Jan 2016 18:03:01 UTC Severi ...
It was discovered that nginx could perform an out of bound read and dereference an invalid pointer when resolving CNAME DNS records An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to crash if nginx enabled the resolver in its configuration (CVE-2016-0742) A use-after-free flaw was found ...
It was discovered that nginx could perform an out of bound read and dereference an invalid pointer when resolving CNAME DNS records An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to crash if nginx enabled the resolver in its configuration ...