Vulnerability Description
The authentication hook (mgs_hook_authz) in mod-gnutls 0.5.10 and earlier does not validate client certificates when "GnuTLSClientVerify require" is set, which allows remote attackers to spoof clients via a crafted certificate.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Mod-Gnutls | <= 0.5.1 |
Related Weaknesses (CWE)
References
- http://issues.outoforder.cc/view.php?id=93Vendor Advisory
- http://www.debian.org/security/2015/dsa-3177
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=578663
- https://security.gentoo.org/glsa/201709-04
- http://issues.outoforder.cc/view.php?id=93Vendor Advisory
- http://www.debian.org/security/2015/dsa-3177
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=578663
- https://security.gentoo.org/glsa/201709-04
FAQ
What is CVE-2015-2091?
CVE-2015-2091 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The authentication hook (mgs_hook_authz) in mod-gnutls 0.5.10 and earlier does not validate client certificates when "GnuTLSClientVerify require" is set, which allows remote attackers to spoof clients...
How severe is CVE-2015-2091?
CVE-2015-2091 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-2091?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Mod-Gnutls.