[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#232630: [CAN-2004-0009] Optional client certificate vulnerability



Package: apache-ssl
Version: 1.3.29.0.1-5
Severity: grave
Tags: security

http://www.apache-ssl.org/advisory-20040206.txt

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0009

Candidate: CAN-2004-0009
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0009
Phase: Assigned (20040105)
Category: SF
Reference: BUGTRAQ:20040206 Apache-SSL security advisory - apache_1.3.28+ssl_1.52 and prior
Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=107619127531765&w=2

Apache-SSL 1.3.28+1.52 and earlier, with SSLVerifyClient set to 1 or 3
and SSLFakeBasicAuth enabled, allows remote attackers to forge a
client certificate by using basic authentication with the "one-line
DN" of the target user.

-- System Information:
Found unknown policy: ('500', 'testing-proposed-updates')Found unknown policy: ('500', 'testing-proposed-updates')Found unknown policy: ('500', 'testing-proposed-updates')Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.4.25-rc2-evms1.2.1
Locale: LANG=C, LC_CTYPE=en_US.ISO8859-1
-- 
Obsig: developing a new sig



Reply to: