5.3
CVSSv3

CVE-2016-0747

Published: 15/02/2016 Updated: 16/12/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The resolver in nginx prior to 1.8.1 and 1.9.x prior to 1.9.10 does not properly limit CNAME resolution, which allows remote malicious users to cause a denial of service (worker process resource consumption) via vectors related to arbitrary name resolution.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

f5 nginx

canonical ubuntu linux 14.04

canonical ubuntu linux 15.10

debian debian linux 7.0

debian debian linux 8.0

debian debian linux 9.0

opensuse leap 42.1

apple xcode

Vendor Advisories

Several security issues were fixed in nginx ...
Debian Bug report logs - #812806 nginx: resolver CVEs: CVE-2016-0742 CVE-2016-0746 CVE-2016-0747 Package: src:nginx; Maintainer for src:nginx is Debian Nginx Maintainers <pkg-nginx-maintainers@alioth-listsdebiannet>; Reported by: Christos Trochalakis <yatiohi@ideopolisgr> Date: Tue, 26 Jan 2016 18:03:01 UTC Severi ...
It was discovered that nginx could perform an out of bound read and dereference an invalid pointer when resolving CNAME DNS records An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to crash if nginx enabled the resolver in its configuration (CVE-2016-0742) A use-after-free flaw was found ...
It was discovered that nginx did not limit recursion when resolving CNAME DNS records An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to use an excessive amount of resources if nginx enabled the resolver in its configuration ...