Input validation error in nginx and Debian Linux - CVE-2011-4968
Published: November 19, 2019 / Updated: August 8, 2020
Vulnerability identifier: #VU35058
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2011-4968
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: F5 Networks
Debian
Debian
Affected software:
nginx
Debian Linux
nginx
Debian Linux
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
nginx http proxy module does not verify peer identity of https origin server which could facilitate man-in-the-middle attack (MITM)
How to mitigate CVE-2011-4968
Install update from vendor's website.
Sources
- http://www.openwall.com/lists/oss-security/2013/01/03/8
- http://www.securityfocus.com/bid/57139
- https://access.redhat.com/security/cve/cve-2011-4968
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4968
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2011-4968
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80952
- https://security-tracker.debian.org/tracker/CVE-2011-4968