MEDIUM · 4.3

CVE-2014-3616

nginx 0.5.6 through 1.7.4, when using the same shared ssl_session_cache or ssl_session_ticket_key for multiple servers, can reuse a cached SSL session for an unrelated context, which allows remote att...

Vulnerability Description

nginx 0.5.6 through 1.7.4, when using the same shared ssl_session_cache or ssl_session_ticket_key for multiple servers, can reuse a cached SSL session for an unrelated context, which allows remote attackers with certain privileges to conduct "virtual host confusion" attacks.

CVSS Score

4.3

MEDIUM

AV:N/AC:M/Au:N/C:N/I:P/A:N
Confidentiality
NONE
Integrity
PARTIAL
Availability
NONE

Affected Products

VendorProductVersions
F5Nginx>= 0.5.6, < 1.6.2
DebianDebian Linux7.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-3616?

CVE-2014-3616 is a vulnerability with a CVSS score of 4.3 (MEDIUM). nginx 0.5.6 through 1.7.4, when using the same shared ssl_session_cache or ssl_session_ticket_key for multiple servers, can reuse a cached SSL session for an unrelated context, which allows remote att...

How severe is CVE-2014-3616?

CVE-2014-3616 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2014-3616?

Check the references section above for vendor advisories and patch information. Affected products include: F5 Nginx, Debian Debian Linux.