This script is Copyright (C) 2014 Tenable Network Security, Inc.
The remote openSUSE host is missing a security update.
The nginx webserver was fixed to avoid a restriction bypass when a
space in not correctly escaped. (CVE-2013-4547)
On openSUSE 12.2, nginx was updated to version 1.4.4 stable
- CVE-2013-4547 a character following an unescaped space
in a request line was handled incorrectly [bnc#851295]
- bugfix: segmentation fault might occur in the spdy
- bugfix: segmentation fault might occur on start if if
the 'try_files' directive was used with an empty
See also :
Update the affected nginx packages.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : true