Lucene search

K
centosCentOS ProjectCESA-2005:773-01
HistorySep 16, 2005 - 12:34 a.m.

mod_ssl security update

2005-09-1600:34:35
CentOS Project
lists.centos.org
37

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

58.8%

CentOS Errata and Security Advisory CESA-2005:773-01

The mod_ssl module provides strong cryptography for the Apache Web
server via the Secure Sockets Layer (SSL) and Transport Layer Security
(TLS) protocols.

A flaw was discovered in mod_ssl’s handling of the “SSLVerifyClient”
directive. This flaw occurs if a virtual host is configured
using “SSLVerifyClient optional” and a directive “SSLVerifyClient
required” is set for a specific location. For servers configured in this
fashion, an attacker may be able to access resources that should otherwise
be protected, by not supplying a client certificate when connecting. The
Common Vulnerabilities and Exposures project assigned the name
CAN-2005-2700 to this issue.

Users of mod_ssl should upgrade to this updated package, which contains a
backported patch to correct this issue.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2005-September/074339.html

Affected packages:
mod_ssl

OSVersionArchitecturePackageVersionFilename
CentOS2i386mod_ssl< 2.8.12-8mod_ssl-2.8.12-8.i386.rpm

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

58.8%

Related for CESA-2005:773-01