-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2013.0217
                           nginx security update
                             18 February 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           nginx
Publisher:         Debian
Operating System:  Debian GNU/Linux 6
Impact/Access:     Denial of Service              -- Remote/Unauthenticated      
                   Provide Misleading Information -- Remote with User Interaction
                   Unauthorised Access            -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2012-4929  

Reference:         ESB-2012.1126

Original Bulletin: 
   http://www.debian.org/security/2013/dsa-2627

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-2627-1                   security@debian.org
http://www.debian.org/security/                           Thijs Kinkhorst
February 17, 2013                      http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : nginx
Vulnerability  : information leak
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2012-4929
Debian Bug     : 700426

Juliano Rizzo and Thai Duong discovered a weakness in the TLS/SSL
protocol when using compression. This side channel attack, dubbed
'CRIME', allows eavesdroppers to gather information to recover the
original plaintext in the protocol. This update to nginx disables
SSL compression.

For the stable distribution (squeeze), this problem has been fixed in
version 0.7.67-3+squeeze3.

For the testing distribution (wheezy), and unstable distribution (sid),
this problem has been fixed in version 1.1.16-1.

We recommend that you upgrade your nginx packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJRILlaAAoJEFb2GnlAHawEajsIAJoBu1SQDZVe0N07eLgrSmYU
4l0Myci9yL1j2gPYCuvi6VTJn9gtAvRtrBbVUJo6u88Npv9WwidG20doXsarxv0G
To0Bt003I5vgCCKv3rHLxjTtrOyMp3kn3/Wh/ypYPYQCn9HBH9nD/5uzCL5CBPBA
zfj0VukmmOPqsm6bRzqyfXppGYw/YDX9N81F0TQRPkOj1vBmvsBfOh6xC4qUJlrz
MqrLGMAQU8PNN7m1RmNQoMrZx21I9yk6GYKmsVIKq7+bg3cvQz4mQxQQYOKLTf0b
FrXThxdr+81lPeKdDDrch0jNRFv1b5g6nI5FIfk71kJRR7YtauXDIXP+iXZuv00=
=ennR
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBUSGfZe4yVqjM2NGpAQJfGBAAkz4h4t9kn67RKGgxsG2cc3lY1ssjDosQ
H+3Qu5sPVRImufTS9JIrMqKd5xymwhlOI5o0Xw/pJ+q/CbUAs1Lo3uqwL0c6mkd8
mPEa9kY2fPkk1sDkCQSj5pLbHMWoOLqqKe3un8aeYqLvAm4deMch+qhFTgFioCdN
3VHJrjlEfe3lCINtpOhsrz5p/E6OkmBaI+53TP2KgrZzk4zYGu6md5/DY8gF6/wh
kM5yvqfng7HZa3cwj46zXZ92J13hsDCmShv0FvQteichJGevufL4cd3FvxwRf6TQ
cSd7E6xl1q6nsMKA9mqKG2+kNMrJ+eVqidgKObmdISnS7uvsMANBfEN1SK5D/thU
koKecCKpbJJGSnHMiaFxbvKxEthGrDPKM2c8hA5ED/bNFMWdXh2SvXZXebuZGyvC
FY9owH6xLihOPyS6Kas3PrqXtlH69mHtOoanNrYCtWHbcaIck7ykozX1wozbMXxE
sA6xqPHqTDS8n1ABS+eFovyE0fwgWolopY5uI0yN3Pag1xzqcMk4x6112/ieXBtT
JW/Cd+rKsj1bX72Tcxzf5lap9c0GUa7RPf0wfodAzpNTLQ5tzCOSohUlT8yy//Mk
hYkCSiUALS9Wb9DhRQ9xz3xNSOYD3Do89nr4yNFl8HD5BsAucmQ5wrapzhuXKjuJ
vL6ReDJOPUI=
=x9RB
-----END PGP SIGNATURE-----