CVE Vulnerabilities

CVE-2014-3616

Insufficient Session Expiration

Published: Dec 08, 2014 | Modified: Apr 12, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V2
5.8 MODERATE
AV:N/AC:M/Au:N/C:P/I:P/A:N
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

nginx 0.5.6 through 1.7.4, when using the same shared ssl_session_cache or ssl_session_ticket_key for multiple servers, can reuse a cached SSL session for an unrelated context, which allows remote attackers with certain privileges to conduct virtual host confusion attacks.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

NameVendorStart VersionEnd Version
NginxF50.5.6 (including)1.6.2 (excluding)
NginxF51.7.0 (including)1.7.5 (excluding)
NginxUbuntuesm-infra-legacy/trusty*
NginxUbuntulucid*
NginxUbuntuprecise*
NginxUbuntutrusty*
NginxUbuntutrusty/esm*
NginxUbuntuupstream*

Potential Mitigations

References