vendor:
Nginx Worker Process
by:
Anonymous
9.3
CVSS
HIGH
Local Privilege Escalation
264
CWE
Product Name: Nginx Worker Process
Affected Version From: 0.4.13-2+etch2
Affected Version To: 0.4.13-2+etch2
Patch Exists: YES
Related CWE: CVE-2009-3555
CPE: a:nginx:nginx
Metasploit:
https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0986/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2011-0880/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0807/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0865/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0770/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0987/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0768/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0786/, https://www.rapid7.com/db/vulnerabilities/sunpatch-145102/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0440/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0338/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0130/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0337/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0339/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0167/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0162/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0119/, https://www.rapid7.com/db/vulnerabilities/ibm-aix-cve-2009-3555/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2009-3555/, https://www.rapid7.com/db/vulnerabilities/vmsa-2010-0019-cve-2009-3555/, https://www.rapid7.com/db/?q=CVE-2009-3555&type=&page=2, https://www.rapid7.com/db/?q=CVE-2009-3555&type=&page=3, https://www.rapid7.com/db/?q=CVE-2009-3555&type=&page=2
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2009
Nginx Worker Process Local Privilege Escalation Vulnerability
A vulnerability in Nginx Worker Process allows an attacker to gain root privileges on a vulnerable system. The vulnerability is due to a race condition in the handling of the SIGCHLD signal. An attacker can exploit this vulnerability by sending a specially crafted SIGCHLD signal to the Nginx Worker Process. This will cause the Nginx Worker Process to execute arbitrary code with root privileges.
Mitigation:
Upgrade to the latest version of Nginx Worker Process or apply the patch provided by the vendor.