nginx vulnerable to MITM Attack [CVE-2011-4968]
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Nginx |
Fix Released
|
Low
|
Unassigned | ||
nginx (Debian) |
Fix Released
|
Unknown
|
|||
nginx (Ubuntu) |
Fix Released
|
Low
|
Unassigned | ||
Lucid |
Won't Fix
|
Low
|
Unassigned | ||
Oneiric |
Won't Fix
|
Low
|
Unassigned | ||
Precise |
Won't Fix
|
Low
|
Unassigned | ||
Quantal |
Won't Fix
|
Low
|
Unassigned | ||
Raring |
Won't Fix
|
Low
|
Unassigned | ||
Trusty |
Won't Fix
|
Low
|
Unassigned | ||
Utopic |
Won't Fix
|
Low
|
Unassigned | ||
Vivid |
Won't Fix
|
Low
|
Unassigned | ||
Wily |
Fix Released
|
Low
|
Unassigned |
Bug Description
I am reporting this bug so there's a bug to track this in within Launchpad. If/when a patch is approved upstream, this bug can be used as a reference point in the changelog when SRU-ing the fix into older releases.
Confirmed as Debian Bug 697940.
Confirmed as CVE-2011-4968.
This has already been added to the Ubuntu Security Team Tracker at http://
Information as follows comes from the Debian Bug:
"When nginx is configured as a reverse proxy with an https origin server, it is vulnerable to a MITM attack, because it does not verify the certificate of the origin server.
This is upstream's bug https:/
It appears to have been known for over a year, but the proposed patches to resolve the problem appear to have never made it through the patch review process in upstream."
Sept. 10, 2015: This was 'fixed' upstream in nginx 1.7.0, with a commit landing upstream about 17 months ago. (see the changeset located at https:/
CVE References
Changed in nginx (Ubuntu Lucid): | |
status: | New → Confirmed |
Changed in nginx (Ubuntu Oneiric): | |
status: | New → Confirmed |
Changed in nginx (Ubuntu Precise): | |
status: | New → Confirmed |
Changed in nginx (Ubuntu Quantal): | |
status: | New → Confirmed |
Changed in nginx (Ubuntu Raring): | |
status: | New → Confirmed |
Changed in nginx (Ubuntu Lucid): | |
importance: | Undecided → Low |
Changed in nginx (Ubuntu Oneiric): | |
importance: | Undecided → Low |
Changed in nginx (Ubuntu Precise): | |
importance: | Undecided → Low |
Changed in nginx (Ubuntu Quantal): | |
importance: | Undecided → Low |
Changed in nginx (Ubuntu Raring): | |
importance: | Undecided → Low |
Changed in nginx (Debian): | |
status: | Unknown → Confirmed |
Changed in nginx (Ubuntu Raring): | |
status: | Confirmed → Won't Fix |
Changed in nginx (Ubuntu Quantal): | |
status: | Confirmed → Won't Fix |
Changed in nginx (Debian): | |
status: | Confirmed → Fix Released |
Oneiric has reached EOL (End of Life) and is no longer supported. As a result, this bug (against Oneiric) is being marked "Won't Fix". Please see https:/ /wiki.ubuntu. com/Releases for currently supported Ubuntu releases.
Please feel free to report any other bugs you may find.