GLSA-201406-20 : nginx: Arbitrary code execution

This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.


Synopsis :

The remote Gentoo host is missing one or more security-related
patches.

Description :

The remote host is affected by the vulnerability described in GLSA-201406-20
(nginx: Arbitrary code execution)

A bug in the SPDY implementation in nginx was found which might cause a
heap memory buffer overflow in a worker process by using a specially
crafted request. The SPDY implementation is not enabled in default
configurations.

Impact :

A remote attacker could cause execution of arbitrary code by using a
specially crafted request.

Workaround :

Disable the spdy module in NGINX_MODULES_HTTP.

See also :

https://security.gentoo.org/glsa/201406-20

Solution :

All nginx users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=www-servers/nginx-1.4.7'

Risk factor :

Medium / CVSS Base Score : 5.1
(CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 4.4
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Gentoo Local Security Checks

Nessus Plugin ID: 76179 ()

Bugtraq ID: 66537

CVE ID: CVE-2014-0133

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now