Debian DSA-3029-1 : nginx - security update

medium Nessus Plugin ID 77762

Synopsis

The remote Debian host is missing a security-related update.

Description

Antoine Delignat-Lavaud and Karthikeyan Bhargavan discovered that it was possible to reuse cached SSL sessions in unrelated contexts, allowing virtual host confusion attacks in some configurations by an attacker in a privileged network position.

Solution

Upgrade the nginx packages.

For the stable distribution (wheezy), this problem has been fixed in version 1.2.1-2.2+wheezy3.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761940

https://packages.debian.org/source/wheezy/nginx

https://www.debian.org/security/2014/dsa-3029

Plugin Details

Severity: Medium

ID: 77762

File Name: debian_DSA-3029.nasl

Version: 1.6

Type: local

Agent: unix

Published: 9/22/2014

Updated: 1/11/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:nginx, cpe:/o:debian:debian_linux:7.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 9/20/2014

Reference Information

CVE: CVE-2014-3616

DSA: 3029