Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-4566

Опубликовано: 03 дек. 2013
Источник: redhat
CVSS2: 4

Описание

mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to bypass intended access restrictions.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Certificate System 8mod_nssWill not fix
Red Hat Directory Server 8fortitude-mod_nssWill not fix
Red Hat Enterprise Linux 7mod_nssNot affected
Red Hat Enterprise Linux 5mod_nssFixedRHSA-2013:177903.12.2013
Red Hat Enterprise Linux 6mod_nssFixedRHSA-2013:177903.12.2013

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1016832mod_nss: incorrect handling of NSSVerifyClient in directory context

4 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 11 лет назад

mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to bypass intended access restrictions.

nvd
больше 11 лет назад

mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to bypass intended access restrictions.

debian
больше 11 лет назад

mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the ...

suse-cvrf
около 11 лет назад

Recommended update for apache2-mod_nss

github
больше 3 лет назад

mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to bypass intended access restrictions.

4 Medium

CVSS2