Scientific Linux Security Update : mod_nss on SL5.x, SL6.x i386/x86_64 (20131203)

medium Nessus Plugin ID 71304

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

A flaw was found in the way mod_nss handled the NSSVerifyClient setting for the per-directory context. When configured to not require a client certificate for the initial connection and only require it for a specific directory, mod_nss failed to enforce this requirement and allowed a client to access the directory when no valid client certificate was provided. (CVE-2013-4566)

The httpd service must be restarted for this update to take effect.

Solution

Update the affected mod_nss and / or mod_nss-debuginfo packages.

See Also

http://www.nessus.org/u?2e8ff767

Plugin Details

Severity: Medium

ID: 71304

File Name: sl_20131203_mod_nss_on_SL5_x.nasl

Version: 1.7

Type: local

Agent: unix

Published: 12/10/2013

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:fermilab:scientific_linux:mod_nss, x-cpe:/o:fermilab:scientific_linux, p-cpe:/a:fermilab:scientific_linux:mod_nss-debuginfo

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 12/3/2013

Vulnerability Publication Date: 12/12/2013

Reference Information

CVE: CVE-2013-4566