FreeBSD : nginx -- SPDY memory corruption (89db3b31-a4c3-11e3-978f-f0def16c5c1b)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

The nginx project reports :

A bug in the experimental SPDY implementation in nginx 1.5.10 was
found, which might allow an attacker to corrupt worker process memory
by using a specially crafted request, potentially resulting in
arbitrary code execution (CVE-2014-0088).

The problem only affects nginx 1.5.10 on 32-bit platforms, compiled
with the ngx_http_spdy_module module (which is not compiled by
default), if the 'spdy' option of the 'listen' directive is used in a
configuration file.

See also :

http://mailman.nginx.org/pipermail/nginx-announce/2014/000132.html
http://www.nessus.org/u?7fe5fdd7

Solution :

Update the affected package.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 72849 ()

Bugtraq ID:

CVE ID: CVE-2014-0088