Vulnerability Description
mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to bypass intended access restrictions.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mod Nss Project | Mod Nss | <= 1.0.8 |
| Redhat | Enterprise Linux | 5 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00118.html
- http://rhn.redhat.com/errata/RHSA-2013-1779.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1016832
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00118.html
- http://rhn.redhat.com/errata/RHSA-2013-1779.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1016832
FAQ
What is CVE-2013-4566?
CVE-2013-4566 is a vulnerability with a CVSS score of 4.0 (MEDIUM). mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to byp...
How severe is CVE-2013-4566?
CVE-2013-4566 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-4566?
Check the references section above for vendor advisories and patch information. Affected products include: Mod Nss Project Mod Nss, Redhat Enterprise Linux.