search menu icon-carat-right cmu-wordmark

CERT Coordination Center

mod_ssl fails to properly enforce client certificates authentication

Vulnerability Note VU#744929

Original Release Date: 2005-09-09 | Last Revised: 2006-10-18

Overview

mod_ssl, the Apache web server module for Secure Socket Layer (SSL) communications, may not properly authenticate client certificates.

Description

mod_ssl provides Secure Socket Layer (SSL) communications for the Apache web server. SSL is designed to provide the ability to encrypt and authenticate TCP connections. Apache, using mod_ssl, can be configured to use SSL to authenticate web users using client certificates.

The requirement for client certificates is not enforced if a web server configuration specifies client authentication as optional ("SSLVerifyClient optional") in the global virtual host configuration, but specifies client certificates as required in some location's context ("SSLVerifyClient require").

Impact

An attacker may access web documents in a restricted section of a web site without providing a valid client certificate.

Solution

Upgrade to mod_ssl 2.8.24 or later, or apply a patch as specified by your vendor.

Vendor Information

744929
 

View all 45 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Reported by Joe Orton of Red Hat.

This document was written by Hal Burch.

Other Information

CVE IDs: CVE-2005-2700
Severity Metric: 1.45
Date Public: 2005-08-31
Date First Published: 2005-09-09
Date Last Updated: 2006-10-18 11:30 UTC
Document Revision: 69

Sponsored by CISA.