{"document":{"category":"csaf_vex","csaf_version":"2.1","notes":[{"category":"summary","text":"Palo Alto Networks PSIRT provided VEX document. This document is autogenerated.","title":"PAN-OS: Nginx software upgraded to resolve multiple vulnerabilities"}],"publisher":{"category":"vendor","name":"Palo Alto Networks","namespace":"https://security.paloaltonetworks.com"},"title":"Palo Alto Networks PSIRT provided VEX document: PAN-SA-2020-0006","distribution":{"text":"Copyright © 2024 Palo Alto Networks. All rights reserved.","tlp":{"label":"CLEAR","url":"https://www.first.org/tlp/"}},"tracking":{"current_release_date":"2026-03-11T22:25:10.524Z","generator":{"date":"2026-03-11T22:25:10.524Z","engine":{"name":"Vulnogram","version":"0.0.9"}},"id":"PAN-SA-2020-0006","initial_release_date":"2020-05-13T16:00:00.000Z","revision_history":[{"number":"1","date":"2020-05-13T09:00:00.000Z","summary":"Initial publication"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"name":"Palo Alto Networks","category":"vendor","branches":[{"name":"PAN-OS","category":"product_name","branches":[{"category":"product_version","name":"PAN-OS 7.1.*","product":{"name":"Palo Alto Networks PAN-OS","product_id":"PANW-PAN-OS-318"}},{"category":"product_version","name":"PAN-OS 8.0.*","product":{"name":"Palo Alto Networks PAN-OS","product_id":"PANW-PAN-OS-313"}},{"category":"product_version_range","name":"vers:generic/PAN-OS<8.1.14","product":{"name":"Palo Alto Networks PAN-OS","product_id":"PANW-PAN-OS-330"}},{"category":"product_version_range","name":"vers:generic/PAN-OS>=8.1.14","product":{"name":"Palo Alto Networks PAN-OS","product_id":"PANW-PAN-OS-330"}},{"category":"product_version_range","name":"vers:generic/PAN-OS<9.0.7","product":{"name":"Palo Alto Networks PAN-OS","product_id":"PANW-PAN-OS-332"}},{"category":"product_version_range","name":"vers:generic/PAN-OS>=9.0.7","product":{"name":"Palo Alto Networks PAN-OS","product_id":"PANW-PAN-OS-332"}}]}]}]},"vulnerabilities":[{"cve":"CVE-2016-4450","product_status":{"fixed":["PANW-PAN-OS-330","PANW-PAN-OS-332"],"known_affected":["PANW-PAN-OS-318","PANW-PAN-OS-313","PANW-PAN-OS-330","PANW-PAN-OS-332"]},"notes":[{"category":"description","text":"os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file."}],"references":[{"category":"external","summary":"NVD - CVE-2016-4450","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4450"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0006"}],"threats":[{"category":"impact","description":"os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file."}]},{"cve":"CVE-2013-0337","product_status":{"fixed":["PANW-PAN-OS-330","PANW-PAN-OS-332"],"known_affected":["PANW-PAN-OS-318","PANW-PAN-OS-313","PANW-PAN-OS-330","PANW-PAN-OS-332"]},"notes":[{"category":"description","text":"The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files."}],"references":[{"category":"external","summary":"NVD - CVE-2013-0337","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-0337"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0006"}],"threats":[{"category":"impact","description":"The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files."}]}]}