Описание
mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to bypass intended access restrictions.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Certificate System 8 | mod_nss | Will not fix | ||
| Red Hat Directory Server 8 | fortitude-mod_nss | Will not fix | ||
| Red Hat Enterprise Linux 7 | mod_nss | Not affected | ||
| Red Hat Enterprise Linux 5 | mod_nss | Fixed | RHSA-2013:1779 | 03.12.2013 |
| Red Hat Enterprise Linux 6 | mod_nss | Fixed | RHSA-2013:1779 | 03.12.2013 |
Показывать по
Дополнительная информация
Статус:
EPSS
4 Medium
CVSS2
Связанные уязвимости
mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to bypass intended access restrictions.
mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to bypass intended access restrictions.
mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the ...
mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to bypass intended access restrictions.
EPSS
4 Medium
CVSS2