|Category:||Debian Local Security Checks|
|Title:||Debian Security Advisory DSA 2802-1 (nginx - restriction bypass)|
|Summary:||Ivan Fratric of the Google Security Team discovered a bug in nginx,;a web server, which might allow an attacker to bypass security;restrictions by using a specially crafted request.;;The oldstable distribution (squeeze) is not affected by this problem.|
Ivan Fratric of the Google Security Team discovered a bug in nginx,
a web server, which might allow an attacker to bypass security
restrictions by using a specially crafted request.
The oldstable distribution (squeeze) is not affected by this problem.
nginx on Debian Linux
For the stable distribution (wheezy), this problem has been fixed in
For the unstable distribution (sid), this problem has been fixed in
We recommend that you upgrade your nginx packages.
Common Vulnerability Exposure (CVE) ID: CVE-2013-4547|
Debian Security Information: DSA-2802 (Google Search)
SuSE Security Announcement: SUSE-SU-2013:1895 (Google Search)
SuSE Security Announcement: openSUSE-SU-2013:1745 (Google Search)
SuSE Security Announcement: openSUSE-SU-2013:1791 (Google Search)
SuSE Security Announcement: openSUSE-SU-2013:1792 (Google Search)
|Copyright||Copyright (C) 2013 Greenbone Networks GmbH http://greenbone.net|
|This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.