4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:H/Au:N/C:P/I:P/A:N
0.007 Low
EPSS
Percentile
80.1%
Issue Overview:
A flaw was found in the way mod_nss handled the NSSVerifyClient setting for the per-directory context. When configured to not require a client certificate for the initial connection and only require it for a specific directory, mod_nss failed to enforce this requirement and allowed a client to access the directory when no valid client certificate was provided. (CVE-2013-4566)
Affected Packages:
mod24_nss
Issue Correction:
Run yum update mod24_nss to update your system.
New Packages:
i686:
mod24_nss-debuginfo-1.0.8-24.17.amzn1.i686
mod24_nss-1.0.8-24.17.amzn1.i686
src:
mod24_nss-1.0.8-24.17.amzn1.src
x86_64:
mod24_nss-1.0.8-24.17.amzn1.x86_64
mod24_nss-debuginfo-1.0.8-24.17.amzn1.x86_64
Red Hat: CVE-2013-4566
Mitre: CVE-2013-4566
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | mod24_nss-debuginfo | < 1.0.8-24.17.amzn1 | mod24_nss-debuginfo-1.0.8-24.17.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | mod24_nss | < 1.0.8-24.17.amzn1 | mod24_nss-1.0.8-24.17.amzn1.i686.rpm |
Amazon Linux | 1 | x86_64 | mod24_nss | < 1.0.8-24.17.amzn1 | mod24_nss-1.0.8-24.17.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | mod24_nss-debuginfo | < 1.0.8-24.17.amzn1 | mod24_nss-debuginfo-1.0.8-24.17.amzn1.x86_64.rpm |