EulerOS 2.0 SP8 : nginx (EulerOS-SA-2019-2084)

high Nessus Plugin ID 129443

Synopsis

The remote EulerOS host is missing multiple security updates.

Description

According to the versions of the nginx packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :

- nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive memory consumption. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the 'http2' option of the 'listen' directive is used in a configuration file.(CVE-2018-16843)

- nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive CPU usage. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the 'http2' option of the 'listen' directive is used in a configuration file.(CVE-2018-16844)

- Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree.
This can consume excess CPU.(CVE-2019-9513)

- Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.(CVE-2019-9511)

- Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.(CVE-2019-9516)

Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected nginx packages.

See Also

http://www.nessus.org/u?b392da62

Plugin Details

Severity: High

ID: 129443

File Name: EulerOS_SA-2019-2084.nasl

Version: 1.7

Type: local

Published: 9/30/2019

Updated: 4/22/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2019-9513

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:huawei:euleros:nginx, p-cpe:/a:huawei:euleros:nginx-all-modules, p-cpe:/a:huawei:euleros:nginx-filesystem, p-cpe:/a:huawei:euleros:nginx-mod-http-image-filter, p-cpe:/a:huawei:euleros:nginx-mod-http-perl, p-cpe:/a:huawei:euleros:nginx-mod-http-xslt-filter, p-cpe:/a:huawei:euleros:nginx-mod-mail, p-cpe:/a:huawei:euleros:nginx-mod-stream, cpe:/o:huawei:euleros:2.0

Required KB Items: Host/local_checks_enabled, Host/EulerOS/release, Host/EulerOS/rpm-list, Host/EulerOS/sp

Excluded KB Items: Host/EulerOS/uvp_version

Exploit Ease: No known exploits are available

Patch Publication Date: 9/30/2019

Reference Information

CVE: CVE-2018-16843, CVE-2018-16844, CVE-2019-9511, CVE-2019-9513, CVE-2019-9516