Description
The nginx package before 1.6.2-5+deb8u3 on Debian jessie, the nginx packages before 1.4.6-1ubuntu3.6 on Ubuntu 14.04 LTS, before 1.10.0-0ubuntu0.16.04.3 on Ubuntu 16.04 LTS, and before 1.10.1-0ubuntu1.1 on Ubuntu 16.10, and the nginx ebuild before 1.10.2-r3 on Gentoo allow local users with access to the web server user account to gain root privileges via a symlink attack on the error log.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3701-1 | nginx security update |
Debian DSA |
DSA-3701-2 | nginx regression update |
EUVD |
EUVD-2016-2346 | The nginx package before 1.6.2-5+deb8u3 on Debian jessie, the nginx packages before 1.4.6-1ubuntu3.6 on Ubuntu 14.04 LTS, before 1.10.0-0ubuntu0.16.04.3 on Ubuntu 16.04 LTS, and before 1.10.1-0ubuntu1.1 on Ubuntu 16.10, and the nginx ebuild before 1.10.2-r3 on Gentoo allow local users with access to the web server user account to gain root privileges via a symlink attack on the error log. |
Ubuntu USN |
USN-3114-1 | nginx vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: debian
Published:
Updated: 2024-08-05T22:48:13.613Z
Reserved: 2015-12-27T00:00:00.000Z
Link: CVE-2016-1247
No data.
Status : Modified
Published: 2016-11-29T17:59:00.167
Modified: 2026-05-06T22:30:45.220
Link: CVE-2016-1247
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN