Lucene search

K
gentooGentoo FoundationGLSA-201709-04
HistorySep 17, 2017 - 12:00 a.m.

mod_gnutls: Certificate validation error

2017-09-1700:00:00
Gentoo Foundation
security.gentoo.org
39

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

48.7%

Background

mod_gnutls is an extension for ​Apache’s httpd. It uses the ​GnuTLS library to provide HTTPS. It supports some protocols and features that mod_ssl does not.

Description

It was discovered that the authentication hook in mod_gnutls does not validate client’s certificates even when option “GnuTLSClientVerify” is set to “require”.

Impact

A remote attacker could present a crafted certificate and spoof clients data.

Workaround

There is no known workaround at this time.

Resolution

All mod_gnutls users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-apache/mod_gnutls-0.7.3"
OSVersionArchitecturePackageVersionFilename
Gentooanyallwww-apache/mod_gnutls< 0.7.3UNKNOWN

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

48.7%