FreeBSD : nginx -- Request line parsing vulnerability (94b6264a-5140-11e3-8b22-f0def16c5c1b)

high Nessus Plugin ID 70965

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The nginx project reports :

Ivan Fratric of the Google Security Team discovered a bug in nginx, which might allow an attacker to bypass security restrictions in certain configurations by using a specially crafted request, or might have potential other impact (CVE-2013-4547).

Solution

Update the affected packages.

See Also

http://mailman.nginx.org/pipermail/nginx-announce/2013/000125.html

http://www.nessus.org/u?1ff1285c

Plugin Details

Severity: High

ID: 70965

File Name: freebsd_pkg_94b6264a514011e38b22f0def16c5c1b.nasl

Version: 1.6

Type: local

Published: 11/20/2013

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:nginx, p-cpe:/a:freebsd:freebsd:nginx-devel, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 11/19/2013

Vulnerability Publication Date: 11/19/2013

Reference Information

CVE: CVE-2013-4547