Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2013-2070

http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.089
EPSS Ranking 92.1%
CVSS Severity
CVSS v2 Score 5.8
References
Products affected by CVE-2013-2070
  • F5 » Nginx » Version: 1.1.10
    cpe:2.3:a:f5:nginx:1.1.10
  • F5 » Nginx » Version: 1.1.11
    cpe:2.3:a:f5:nginx:1.1.11
  • F5 » Nginx » Version: 1.1.12
    cpe:2.3:a:f5:nginx:1.1.12
  • F5 » Nginx » Version: 1.1.13
    cpe:2.3:a:f5:nginx:1.1.13
  • F5 » Nginx » Version: 1.1.14
    cpe:2.3:a:f5:nginx:1.1.14
  • F5 » Nginx » Version: 1.1.15
    cpe:2.3:a:f5:nginx:1.1.15
  • F5 » Nginx » Version: 1.1.16
    cpe:2.3:a:f5:nginx:1.1.16
  • F5 » Nginx » Version: 1.1.17
    cpe:2.3:a:f5:nginx:1.1.17
  • F5 » Nginx » Version: 1.1.18
    cpe:2.3:a:f5:nginx:1.1.18
  • F5 » Nginx » Version: 1.1.19
    cpe:2.3:a:f5:nginx:1.1.19
  • F5 » Nginx » Version: 1.1.4
    cpe:2.3:a:f5:nginx:1.1.4
  • F5 » Nginx » Version: 1.1.5
    cpe:2.3:a:f5:nginx:1.1.5
  • F5 » Nginx » Version: 1.1.6
    cpe:2.3:a:f5:nginx:1.1.6
  • F5 » Nginx » Version: 1.1.7
    cpe:2.3:a:f5:nginx:1.1.7
  • F5 » Nginx » Version: 1.1.8
    cpe:2.3:a:f5:nginx:1.1.8
  • F5 » Nginx » Version: 1.1.9
    cpe:2.3:a:f5:nginx:1.1.9
  • F5 » Nginx » Version: 1.2.0
    cpe:2.3:a:f5:nginx:1.2.0
  • F5 » Nginx » Version: 1.2.1
    cpe:2.3:a:f5:nginx:1.2.1
  • F5 » Nginx » Version: 1.2.2
    cpe:2.3:a:f5:nginx:1.2.2
  • F5 » Nginx » Version: 1.2.3
    cpe:2.3:a:f5:nginx:1.2.3
  • F5 » Nginx » Version: 1.2.4
    cpe:2.3:a:f5:nginx:1.2.4
  • F5 » Nginx » Version: 1.2.5
    cpe:2.3:a:f5:nginx:1.2.5
  • F5 » Nginx » Version: 1.2.6
    cpe:2.3:a:f5:nginx:1.2.6
  • F5 » Nginx » Version: 1.2.7
    cpe:2.3:a:f5:nginx:1.2.7
  • F5 » Nginx » Version: 1.2.8
    cpe:2.3:a:f5:nginx:1.2.8
  • F5 » Nginx » Version: 1.3.10
    cpe:2.3:a:f5:nginx:1.3.10
  • F5 » Nginx » Version: 1.3.11
    cpe:2.3:a:f5:nginx:1.3.11
  • F5 » Nginx » Version: 1.3.12
    cpe:2.3:a:f5:nginx:1.3.12
  • F5 » Nginx » Version: 1.3.13
    cpe:2.3:a:f5:nginx:1.3.13
  • F5 » Nginx » Version: 1.3.14
    cpe:2.3:a:f5:nginx:1.3.14
  • F5 » Nginx » Version: 1.3.15
    cpe:2.3:a:f5:nginx:1.3.15
  • F5 » Nginx » Version: 1.3.16
    cpe:2.3:a:f5:nginx:1.3.16
  • F5 » Nginx » Version: 1.3.9
    cpe:2.3:a:f5:nginx:1.3.9
  • F5 » Nginx » Version: 1.4.0
    cpe:2.3:a:f5:nginx:1.4.0
  • Debian » Debian Linux » Version: 6.0
    cpe:2.3:o:debian:debian_linux:6.0
  • Debian » Debian Linux » Version: 7.0
    cpe:2.3:o:debian:debian_linux:7.0


Contact Us

Shodan ® - All rights reserved