Source: nginx
Version: 1.6.2-5
Severity: grave
Tags: security

Originally filed by myself downstream in Ubuntu at
https://bugs.launchpad.net/nginx/+bug/1403283

Originally identified in 1.6.2-5, but it likely affects other versions
as well, if `gzip on;` is defined in the default configs.

(Severity set as 'grave' per the lowest severity identified on the tags
documentation page for setting tags on bugs.  Please change this if you
feel this is incorrect, as I thought it should be 'important' instead of
'grave'.)

------

The BREACH vulnerability (http://breachattack.com/
<http://breachattack.com/>) is not mitigated in the default nginx.conf
configuration file.

Details on the BREACH vulnerability are available at the link above.
HTTP level compression served over a TLS connection is vulnerable to the
same attack as CRIME, but without the TLS-level compression.

This is easily mitigated by changing `gzip on;` in the nginx.conf file
to `gzip off;` which disables `gzip` compression except where overridden
later by sites' configurations.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to