The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (invalid pointer dereference and worker process crash) via a crafted UDP DNS response.
{ "binaries": [ { "binary_version": "1.4.6-1ubuntu3.4", "binary_name": "nginx" }, { "binary_version": "1.4.6-1ubuntu3.4", "binary_name": "nginx-common" }, { "binary_version": "1.4.6-1ubuntu3.4", "binary_name": "nginx-core" }, { "binary_version": "1.4.6-1ubuntu3.4", "binary_name": "nginx-extras" }, { "binary_version": "1.4.6-1ubuntu3.4", "binary_name": "nginx-full" }, { "binary_version": "1.4.6-1ubuntu3.4", "binary_name": "nginx-light" }, { "binary_version": "1.4.6-1ubuntu3.4", "binary_name": "nginx-naxsi" }, { "binary_version": "1.4.6-1ubuntu3.4", "binary_name": "nginx-naxsi-ui" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "1.9.10-0ubuntu1", "binary_name": "nginx" }, { "binary_version": "1.9.10-0ubuntu1", "binary_name": "nginx-common" }, { "binary_version": "1.9.10-0ubuntu1", "binary_name": "nginx-core" }, { "binary_version": "1.9.10-0ubuntu1", "binary_name": "nginx-extras" }, { "binary_version": "1.9.10-0ubuntu1", "binary_name": "nginx-full" }, { "binary_version": "1.9.10-0ubuntu1", "binary_name": "nginx-light" } ], "availability": "No subscription required" }