Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2005-773: mod_ssl


Vulnerability Assessment Details

RHSA-2005-773: mod_ssl

Vulnerability Assessment Summary
Check for the version of the mod_ssl packages

Detailed Explanation for this Vulnerability Assessment


An updated mod_ssl package for Apache that corrects a security issue is now
available.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

The mod_ssl module provides strong cryptography for the Apache Web
server via the Secure Sockets Layer (SSL) and Transport Layer Security
(TLS) protocols.

A flaw was discovered in mod_ssl's handling of the "SSLVerifyClient"
directive. This flaw occurs if a virtual host is configured
using "SSLVerifyClient optional" and a directive "SSLVerifyClient
required" is set for a specific location. For servers configured in this
fashion, a possible hacker may be able to access resources that should otherwise
be protected, by not supplying a client certificate when connecting. The
Common Vulnerabilities and Exposures project assigned the name
CVE-2005-2700 to this issue.

Users of mod_ssl should upgrade to this updated package, which contains a
backported patch to correct this issue.




Solution : http://rhn.redhat.com/errata/RHSA-2005-773.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

DELL POWEREDGE R820 bare bones, good working before removal of CPUs and RAMs
$729.0
DELL POWEREDGE R820 bare bones, good working before removal of CPUs and RAMs  pictureDell PowerEdge R720 2x E5-2690 v2 3.0Ghz 10 Core 32GB 8x 3TB 7.2K SAS H710
$6550.0
Dell PowerEdge R720 2x E5-2690 v2 3.0Ghz 10 Core 32GB 8x 3TB 7.2K SAS H710 pictureDELL PE R620 2x 2.90Ghz E5-2690 8C 192GB 3x 600GB SSD 5x 1TB SAS 90-Day Warranty
$3386.25
DELL PE R620 2x 2.90Ghz E5-2690 8C 192GB 3x 600GB SSD 5x 1TB SAS 90-Day Warranty pictureDell PowerEdge R710 Server 2x 2.66GHz Quad Core Xeon | 48gb | DVD-RW | PC3-8500
$199.99
Dell PowerEdge R710 Server 2x 2.66GHz Quad Core Xeon | 48gb | DVD-RW | PC3-8500 picture


Discussions

No Discussions have been posted on this vulnerability.