exploit the possibilities
Showing 1 - 7 of 7 RSS Feed

CVE-2013-2028

Status Candidate

Overview

The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow.

Related Files

nginx 1.4.0 64-bit Linux Remote Code Execution
Posted Mar 18, 2014
Authored by Sorbo

nginx version 1.4.0 remote code execution exploit that leverages a new attack technique called BROP (Blind ROP).

tags | exploit, remote, code execution
systems | linux
advisories | CVE-2013-2028
MD5 | 4fe89a20d463c4ce41cb62c18ae60593
Gentoo Linux Security Advisory 201310-04
Posted Oct 7, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201310-4 - Multiple vulnerabilities have been found in nginx, the worst of which may allow execution of arbitrary code. Versions less than 1.4.1-r2 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2013-0337, CVE-2013-2028, CVE-2013-2070
MD5 | 10584c0bc5bcf6c2caac9e3fa0d48661
Nginx 1.3.9 / 1.4.0 Exploit Documentation
Posted Jul 23, 2013
Authored by Kingcope

This whitepaper document how the brute forcing exploit works for a buffer overflow vulnerability in nginx versions 1.3.9 and 1.4.0 on x86.

tags | paper, overflow, x86
advisories | CVE-2013-2028
MD5 | f28b004786a1a95ee6d162e27c74c651
Nginx 1.3.9 / 1.4.0 Buffer Overflow
Posted Jul 19, 2013
Authored by Hoang-Vu Dang | Site vnsecurity.net

Nginx versions 1.3.9 and 1.4.0 chunked encoding stack based buffer overflow exploit.

tags | exploit, overflow
advisories | CVE-2013-2028
MD5 | 21a00556e820bc5372eade04415e2278
Nginx HTTP Server 1.3.9-1.4.0 Chunked Encoding Stack Buffer Overflow
Posted May 23, 2013
Authored by Greg MacManus, hal, saelo | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in versions 1.3.9 to 1.4.0 of nginx. The exploit first triggers an integer overflow in the ngx_http_parse_chunked() by supplying an overly long hex value as chunked block size. This value is later used when determining the number of bytes to read into a stack buffer, thus the overflow becomes possible.

tags | exploit, overflow
advisories | CVE-2013-2028, OSVDB-93037
MD5 | 94362300dbd4b7f9d4fd7deca32fd52d
Nginx 1.3.9 / 1.4.0 Denial Of Service
Posted May 17, 2013
Authored by Mert SARICA | Site mertsarica.com

Nginx versions 1.3.9 through 1.4.0 suffer from a denial of service vulnerability.

tags | exploit, denial of service, python
advisories | CVE-2013-2028
MD5 | 7168924e671fc0ce746eb328b332a580
Nginx 1.3.9 / 1.4.0 Stack Buffer Overflow
Posted May 8, 2013
Authored by Greg MacManus, Maxim Dounin | Site nginx.org

Nginx versions 1.3.9 through 1.4.0 suffer from a stack-based buffer overflow vulnerability.

tags | advisory, overflow
advisories | CVE-2013-2028
MD5 | 2e30423ae67e1274fb9d93f6223e2154
Page 1 of 1
Back1Next

File Archive:

November 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    28 Files
  • 2
    Nov 2nd
    1 Files
  • 3
    Nov 3rd
    1 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    19 Files
  • 6
    Nov 6th
    65 Files
  • 7
    Nov 7th
    22 Files
  • 8
    Nov 8th
    18 Files
  • 9
    Nov 9th
    1 Files
  • 10
    Nov 10th
    1 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    65 Files
  • 13
    Nov 13th
    27 Files
  • 14
    Nov 14th
    22 Files
  • 15
    Nov 15th
    18 Files
  • 16
    Nov 16th
    1 Files
  • 17
    Nov 17th
    3 Files
  • 18
    Nov 18th
    22 Files
  • 19
    Nov 19th
    17 Files
  • 20
    Nov 20th
    15 Files
  • 21
    Nov 21st
    16 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close