MEDIUM · 5.0

CVE-2015-2091

The authentication hook (mgs_hook_authz) in mod-gnutls 0.5.10 and earlier does not validate client certificates when "GnuTLSClientVerify require" is set, which allows remote attackers to spoof clients...

Vulnerability Description

The authentication hook (mgs_hook_authz) in mod-gnutls 0.5.10 and earlier does not validate client certificates when "GnuTLSClientVerify require" is set, which allows remote attackers to spoof clients via a crafted certificate.

CVSS Score

5.0

MEDIUM

AV:N/AC:L/Au:N/C:N/I:P/A:N
Confidentiality
NONE
Integrity
PARTIAL
Availability
NONE

Affected Products

VendorProductVersions
ApacheMod-Gnutls<= 0.5.1

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-2091?

CVE-2015-2091 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The authentication hook (mgs_hook_authz) in mod-gnutls 0.5.10 and earlier does not validate client certificates when "GnuTLSClientVerify require" is set, which allows remote attackers to spoof clients...

How severe is CVE-2015-2091?

CVE-2015-2091 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-2091?

Check the references section above for vendor advisories and patch information. Affected products include: Apache Mod-Gnutls.