CVE-2005-2700 Information

Share on:

Description

ssl_engine_kernel.c in mod_ssl before 2.8.24 when using \SSLVerifyClient optional\ in the global virtual host configuration does not properly enforce \SSLVerifyClient require\ in a per-location context which allows remote attackers to bypass intended access restrictions.

Reference

http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html http://marc.info/?l=apache-modssl&m=112569517603897&w=2 http://marc.info/?l=bugtraq&m=112604765028607&w=2 http://marc.info/?l=bugtraq&m=112870296926652&w=2 http://people.apache.org/~jorton/CAN-2005-2700.diff http://secunia.com/advisories/16700 http://secunia.com/advisories/16705 http://secunia.com/advisories/16714 http://secunia.com/advisories/16743 http://secunia.com/advisories/16746 http://secunia.com/advisories/16748 http://secunia.com/advisories/16753 http://secunia.com/advisories/16754 http://secunia.com/advisories/16769 http://secunia.com/advisories/16771 http://secunia.com/advisories/16789 http://secunia.com/advisories/16864 http://secunia.com/advisories/16956 http://secunia.com/advisories/17088 http://secunia.com/advisories/17288 http://secunia.com/advisories/17311 http://secunia.com/advisories/17813 http://secunia.com/advisories/19072 http://secunia.com/advisories/19073 http://secunia.com/advisories/21848 http://secunia.com/advisories/22523 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102197-1 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102198-1 http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm http://www.debian.org/security/2005/dsa-805 http://www.debian.org/security/2005/dsa-807 http://www.gentoo.org/security/en/glsa/glsa-200509-12.xml http://www.kb.cert.org/vuls/id/744929 http://www.mandriva.com/security/advisories?name=MDKSA-2005:161 http://www.novell.com/linux/security/advisories/2005_51_apache2.html http://www.novell.com/linux/security/advisories/2005_52_apache2.html http://www.osvdb.org/19188 http://www.redhat.com/support/errata/RHSA-2005-608.html http://www.redhat.com/support/errata/RHSA-2005-773.html http://www.redhat.com/support/errata/RHSA-2005-816.html http://www.securityfocus.com/bid/14721 http://www.ubuntu.com/usn/usn-177-1 http://www.vupen.com/english/advisories/2005/1625 http://www.vupen.com/english/advisories/2005/2659 http://www.vupen.com/english/advisories/2006/0789 http://www.vupen.com/english/advisories/2006/4207 http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3117 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=167195 https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb@3Cdev.httpd.apache.org3E https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@3Ccvs.httpd.apache.org3E https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47@3Cdev.httpd.apache.org3E https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@3Ccvs.httpd.apache.org3E https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@3Ccvs.httpd.apache.org3E https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@3Ccvs.httpd.apache.org3E https://lists.opensuse.org/opensuse-security-announce/2006-09/msg00016.html https://oval.cisecurity.org/repository/search/definition/oval3Aorg.mitre.oval3Adef3A10416