openSUSE Security Update : nginx (openSUSE-SU-2014:0450-1)

medium Nessus Plugin ID 75309

Synopsis

The remote openSUSE host is missing a security update.

Description

nginx was updated to 1.4.7 to fix bugs and security issues.

Fixed security issues :

- CVE-2014-0133: nginx:heap-based buffer overflow in SPDY implementation

New upstream release 1.4.7 (bnc#869076) (CVE-2014-0133)

*) Security: a heap memory buffer overflow might occur in a worker process while handling a specially crafted request by ngx_http_spdy_module, potentially resulting in arbitrary code execution (CVE-2014-0133). Thanks to Lucas Molas, researcher at Programa STIC, Fundación Dr. Manuel Sadosky, Buenos Aires, Argentina.

*) Bugfix: in the 'fastcgi_next_upstream' directive. Thanks to Lucas Molas.

*) Bugfix: the 'client_max_body_size' directive might not work when reading a request body using chunked transfer encoding; the bug had appeared in 1.3.9. Thanks to Lucas Molas.

*) Bugfix: a segmentation fault might occur in a worker process when proxying WebSocket connections.

*) Bugfix: the $ssl_session_id variable contained full session serialized instead of just a session id. Thanks to Ivan Ristić.

*) Bugfix: client connections might be immediately closed if deferred accept was used; the bug had appeared in 1.3.15.

*) Bugfix: alerts 'zero size buf in output' might appear in logs while proxying; the bug had appeared in 1.3.9.

*) Bugfix: a segmentation fault might occur in a worker process if the ngx_http_spdy_module was used.

*) Bugfix: proxied WebSocket connections might hang right after handshake if the select, poll, or /dev/poll methods were used.

*) Bugfix: a timeout might occur while reading client request body in an SSL connection using chunked transfer encoding.

*) Bugfix: memory leak in nginx/Windows.

Solution

Update the affected nginx packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=869076

https://lists.opensuse.org/opensuse-updates/2014-03/msg00095.html

Plugin Details

Severity: Medium

ID: 75309

File Name: openSUSE-2014-258.nasl

Version: 1.4

Type: local

Agent: unix

Published: 6/13/2014

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:nginx, cpe:/o:novell:opensuse:13.1, p-cpe:/a:novell:opensuse:nginx-debugsource, p-cpe:/a:novell:opensuse:nginx-debuginfo

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 3/19/2014

Reference Information

CVE: CVE-2014-0133