Security Bulletin: Aspera Applications are affected by a Nginx vulnerability

Security Bulletin


Aspera Applications has addressed the following vulnerability: Nginx could allow a remote attacker to obtain sensitive information caused by an integer overflow in nginx range filter mode.

Vulnerability Details

CVEID: CVE-2017-7529
DESCRIPTION: Nginx could allow a remote attacker to obtain sensitive information, caused by an integer overflow in nginx range filter module. By sending specially-crafted requet, a remote attacker could exploit this vulnerability to obtain sensitive information.
CVSS Base Score: 5.3
CVSS Temporal Score: See for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

Affected Aspera Applications

Affected Versions


1.9.10 and prior


1.4.1 and prior






Remediation / First Fix


1.9.11 or higher


1.4.2 or higher

ETA - 1/15/2018



Fixed as of 9/7/2017

Workarounds and Mitigations

To mitigate the issue in an affected version, add the following setting in the nginx configuration file. Reference for more information.

max_ranges 1;


Complete CVSS v3 Guide

On-line Calculator v3

Related Information

IBM Secure Engineering Web Portal 
IBM Product Security Incident Response Blog

Change History

29 September 2017: Original version published


*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.


According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.


Powered by Zendesk