MEDIUM · 4.0

CVE-2013-4566

mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to byp...

Vulnerability Description

mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to bypass intended access restrictions.

CVSS Score

4.0

MEDIUM

AV:N/AC:H/Au:N/C:P/I:P/A:N
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
NONE

Affected Products

VendorProductVersions
Mod Nss ProjectMod Nss<= 1.0.8
RedhatEnterprise Linux5

Related Weaknesses (CWE)

References

FAQ

What is CVE-2013-4566?

CVE-2013-4566 is a vulnerability with a CVSS score of 4.0 (MEDIUM). mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to byp...

How severe is CVE-2013-4566?

CVE-2013-4566 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2013-4566?

Check the references section above for vendor advisories and patch information. Affected products include: Mod Nss Project Mod Nss, Redhat Enterprise Linux.