First published: Mon Dec 08 2014(Updated: )
nginx 0.5.6 through 1.7.4, when using the same shared ssl_session_cache or ssl_session_ticket_key for multiple servers, can reuse a cached SSL session for an unrelated context, which allows remote attackers with certain privileges to conduct "virtual host confusion" attacks.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Nginx | >=0.5.6<1.6.2 | |
F5 Nginx | >=1.7.0<1.7.5 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.