Vulnerability Description
mod-gnutls does not validate client certificates when "GnuTLSClientVerify require" is set in a directory context, which allows remote attackers to spoof clients via a crafted certificate.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mod Gnutls Project | Mod Gnutls | - |
Related Weaknesses (CWE)
References
- http://issues.outoforder.cc/view.php?id=93Broken Link
- http://www.openwall.com/lists/oss-security/2015/02/26/6Issue TrackingMailing List
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=578663Issue TrackingMailing ListPatch
- https://bugzilla.redhat.com/show_bug.cgi?id=1197127Issue TrackingPatch
- http://issues.outoforder.cc/view.php?id=93Broken Link
- http://www.openwall.com/lists/oss-security/2015/02/26/6Issue TrackingMailing List
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=578663Issue TrackingMailing ListPatch
- https://bugzilla.redhat.com/show_bug.cgi?id=1197127Issue TrackingPatch
FAQ
What is CVE-2009-5144?
CVE-2009-5144 is a vulnerability with a CVSS score of 7.5 (HIGH). mod-gnutls does not validate client certificates when "GnuTLSClientVerify require" is set in a directory context, which allows remote attackers to spoof clients via a crafted certificate.
How severe is CVE-2009-5144?
CVE-2009-5144 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-5144?
Check the references section above for vendor advisories and patch information. Affected products include: Mod Gnutls Project Mod Gnutls.