NGINX Plus and NGINX Open Source have a vulnerability in the ngx_mail_smtp_module module due to the improper handling of CRLF sequences in DNS responses. This allows an attacker-controlled DNS server to inject arbitrary headers into SMTP upstream requests, leading to potential request manipulation. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
| Vendor | Product | Versions |
|---|---|---|
| f5 | nginx_plus | <= 0.9.7, < 1.28.3, < 1.29.7 |
Downstream vendors/products affected by this vulnerability
| Vendor | Product | Source | Confidence |
|---|---|---|---|
| fedora | fedora linux | cert_advisory | 90% |
| nginx | nginx | cert_advisory | 90% |
| nginx | nginx plus | cert_advisory | 90% |
| oracle | oracle linux | cert_advisory | 90% |
| red hat | red hat enterprise linux | cert_advisory | 90% |