10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.002 Low
EPSS
Percentile
59.6%
CentOS Errata and Security Advisory CESA-2005:773-01
The mod_ssl module provides strong cryptography for the Apache Web
server via the Secure Sockets Layer (SSL) and Transport Layer Security
(TLS) protocols.
A flaw was discovered in mod_ssl’s handling of the “SSLVerifyClient”
directive. This flaw occurs if a virtual host is configured
using “SSLVerifyClient optional” and a directive “SSLVerifyClient
required” is set for a specific location. For servers configured in this
fashion, an attacker may be able to access resources that should otherwise
be protected, by not supplying a client certificate when connecting. The
Common Vulnerabilities and Exposures project assigned the name
CAN-2005-2700 to this issue.
Users of mod_ssl should upgrade to this updated package, which contains a
backported patch to correct this issue.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2005-September/074339.html
Affected packages:
mod_ssl
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 2 | i386 | mod_ssl | < 2.8.12-8 | mod_ssl-2.8.12-8.i386.rpm |