nginx 0.5.6 through 1.7.4, when using the same shared sslsessioncache or sslsessionticket_key for multiple servers, can reuse a cached SSL session for an unrelated context, which allows remote attackers with certain privileges to conduct "virtual host confusion" attacks.
{ "binaries": [ { "binary_name": "nginx", "binary_version": "1.4.6-1ubuntu3.1" }, { "binary_name": "nginx-common", "binary_version": "1.4.6-1ubuntu3.1" }, { "binary_name": "nginx-core", "binary_version": "1.4.6-1ubuntu3.1" }, { "binary_name": "nginx-core-dbg", "binary_version": "1.4.6-1ubuntu3.1" }, { "binary_name": "nginx-doc", "binary_version": "1.4.6-1ubuntu3.1" }, { "binary_name": "nginx-extras", "binary_version": "1.4.6-1ubuntu3.1" }, { "binary_name": "nginx-extras-dbg", "binary_version": "1.4.6-1ubuntu3.1" }, { "binary_name": "nginx-full", "binary_version": "1.4.6-1ubuntu3.1" }, { "binary_name": "nginx-full-dbg", "binary_version": "1.4.6-1ubuntu3.1" }, { "binary_name": "nginx-light", "binary_version": "1.4.6-1ubuntu3.1" }, { "binary_name": "nginx-light-dbg", "binary_version": "1.4.6-1ubuntu3.1" }, { "binary_name": "nginx-naxsi", "binary_version": "1.4.6-1ubuntu3.1" }, { "binary_name": "nginx-naxsi-dbg", "binary_version": "1.4.6-1ubuntu3.1" }, { "binary_name": "nginx-naxsi-ui", "binary_version": "1.4.6-1ubuntu3.1" } ], "availability": "No subscription required" }