CVE Vulnerabilities

CVE-2011-4973

Improper Authentication

Published: Feb 15, 2018 | Modified: Nov 21, 2024
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
4 MODERATE
AV:N/AC:H/Au:N/C:P/I:P/A:N
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Authentication bypass vulnerability in mod_nss 1.0.8 allows remote attackers to assume the identity of a valid user by using their certificate and entering password as the password.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
Mod_nssMod_nss_project1.0.8 (including)1.0.8 (including)
Red Hat Enterprise Linux 5RedHatmod_nss-0:1.0.8-7.el5*
Red Hat Enterprise Linux 6RedHatmod_nss-0:1.0.8-13.el6*
Libapache2-mod-nssUbuntuartful*
Libapache2-mod-nssUbuntubionic*
Libapache2-mod-nssUbuntucosmic*
Libapache2-mod-nssUbuntuesm-apps/bionic*
Libapache2-mod-nssUbuntuesm-apps/xenial*
Libapache2-mod-nssUbuntuprecise*
Libapache2-mod-nssUbuntuquantal*
Libapache2-mod-nssUbunturaring*
Libapache2-mod-nssUbuntusaucy*
Libapache2-mod-nssUbuntutrusty*
Libapache2-mod-nssUbuntuupstream*
Libapache2-mod-nssUbuntuutopic*
Libapache2-mod-nssUbuntuvivid*
Libapache2-mod-nssUbuntuwily*
Libapache2-mod-nssUbuntuxenial*
Libapache2-mod-nssUbuntuyakkety*
Libapache2-mod-nssUbuntuzesty*

Potential Mitigations

References