High severity7.5NVD Advisory· Published Feb 15, 2016· Updated May 6, 2026
CVE-2016-0742
CVE-2016-0742
Description
The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (invalid pointer dereference and worker process crash) via a crafted UDP DNS response.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party Advisory
- lists.opensuse.org/opensuse-updates/2016-02/msg00042.htmlnvdMailing ListThird Party Advisory
- mailman.nginx.org/pipermail/nginx/2016-January/049700.htmlnvdVendor Advisory
- seclists.org/fulldisclosure/2021/Sep/36nvdMailing ListThird Party Advisory
- www.debian.org/security/2016/dsa-3473nvdThird Party Advisory
- www.securitytracker.com/id/1034869nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-2892-1nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2016:1425nvdThird Party Advisory
- bto.bluecoat.com/security-advisory/sa115nvdThird Party Advisory
- security.gentoo.org/glsa/201606-06nvdThird Party Advisory
- support.apple.com/kb/HT212818nvdThird Party Advisory
News mentions
0No linked articles in our index yet.