Overhauls announced for the nginx open source web server software the running week describe various Denial of Service flaws.

Nginx can be utilized as an inverse and a load balance proxy in addition to offering web server practicality. It influences abruptly four hundred million websites, which generates it one of the most broadly employed web servers. The company, NGINX, Inc. behind nginx, has increased over 100US million, containing 43US million in June 2018.

The current week, Nginx developers declared that 1.15.6 and 1.14.1 versions describe two HTTP/execution flaws that can lead to a Denial of Service situation. The matters affect versions 1.9.5 through 1.15.5. One of the vulnerabilities, tracked as CVE-2018-16843, can outcome in inordinate memory activity. The different security flaw, detected by Gal Goldshtein from F5 Networks and recognized as CVE-2018-16844, can reason immoderate CPU utilization.

“The issues affect nginx compiled with the ngx_http_v2_module (not compiled by default) if the ‘http2’ option of the ‘listen’ directive is used in a configuration file,” explained nginx core developer Maxim Dounin.

Administrators of the website employing nginx were also communicated of a security flaw impacting the ngx_http_mp4_module component, which offers pseudo-streaming assistance for MP4 media files. The flaw, path as CVE-2018-16845, can permit a hacker to reason the individual activity to clang or leak memory by acquiring the component to method a particular crafted MP4 file.

“The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the ‘mp4’ directive is used in the configuration file,” Dounin explained. “Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.”

This flaw affects nginx 1.1.3 and subsequent and 1.0.7 and upcoming, and it was also fixed with the deliver on November 6, about versions 1.15.6 and 1.14.1.

Leave a Reply

Your email address will not be published. Required fields are marked *