Nginx Plus R1 < R15-P2 / R16 < R16-P1 Multiple Vulnerabilities

medium Nessus Plugin ID 161696

Synopsis

The remote web server is affected by multiple vulnerabilities.

Description

According to it's self reported version, the installed version of Nginx Plus is R1 (built on Open Source version 1.5.3-1) prior to R15-P2 or R16 (built on Open Source version 1.15.2) prior to R16-P1. It is, therefore, affected by the following issues :

- An unspecified error exists related to the module 'ngx_http_v2_module' that allows excessive memory usage.
(CVE-2018-16843)

- An unspecified error exists related to the module 'ngx_http_v2_module' that allows excessive CPU usage.
(CVE-2018-16844)

- An unspecified error exists related to the module 'ngx_http_mp4_module' that allows worker process crashes or memory disclosure. (CVE-2018-16845)

Solution

Upgrade to Nginx Plus R15-P2 / R16-P1 or later.

See Also

https://docs.nginx.com/nginx/releases/

http://nginx.org/en/security_advisories.html

http://mailman.nginx.org/pipermail/nginx-announce/2018/000220.html

http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html

Plugin Details

Severity: Medium

ID: 161696

File Name: nginx_plus_r16p1.nasl

Version: 1.1

Type: local

Agent: unix

Family: Web Servers

Published: 5/31/2022

Updated: 5/31/2022

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:P

CVSS Score Source: CVE-2018-16845

CVSS v3

Risk Factor: Medium

Base Score: 6.1

Temporal Score: 5.3

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:nginx:nginx

Required KB Items: installed_sw/nginx plus

Exploit Ease: No known exploits are available

Patch Publication Date: 11/6/2018

Vulnerability Publication Date: 1/6/2018

Reference Information

CVE: CVE-2018-16843, CVE-2018-16844, CVE-2018-16845

BID: 105868