CVE-2013-2028

F5 Nginx < 1.4.0 - Out-of-Bounds Write

Title source: rule

Description

The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow.

Exploits (12)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/25775
exploitdb WORKING POC
by sorbo · textremotelinux_x86-64
https://www.exploit-db.com/exploits/32277
exploitdb WORKING POC
by kingcope · perlremotelinux_x86
https://www.exploit-db.com/exploits/26737
exploitdb WORKING POC
by Mert SARICA · pythondoslinux
https://www.exploit-db.com/exploits/25499
nomisec WORKING POC 55 stars
by kitctf · poc
https://github.com/kitctf/nginxpwn
nomisec WORKING POC 30 stars
by danghvu · poc
https://github.com/danghvu/nginx-1.4.0
nomisec WORKING POC 20 stars
by m4drat · poc
https://github.com/m4drat/CVE-2013-2028-Exploit
nomisec WORKING POC 3 stars
by tachibana51 · poc
https://github.com/tachibana51/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC
nomisec WORKING POC 1 stars
by jptr218 · poc
https://github.com/jptr218/nginxhack
nomisec SCANNER
by xiw1ll · poc
https://github.com/xiw1ll/CVE-2013-2028_Checker
nomisec WORKING POC
by Sunqiz · poc
https://github.com/Sunqiz/CVE-2013-2028-reproduction
metasploit WORKING POC GREAT
by Greg MacManus, hal, saelo · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/nginx_chunked_size.rb

Scores

EPSS 0.9304
EPSS Percentile 99.8%

Details

CWE
CWE-787
Status published
Products (2)
f5/nginx 1.3.9 - 1.4.0
fedoraproject/fedora 19
Published Jul 20, 2013
Tracked Since Feb 18, 2026