CVE Vulnerabilities

CVE-2013-4566

Published: Dec 12, 2013 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4 MEDIUM
AV:N/AC:H/Au:N/C:P/I:P/A:N
RedHat/V2
4 MODERATE
AV:N/AC:H/Au:N/C:P/I:P/A:N
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to bypass intended access restrictions.

Affected Software

NameVendorStart VersionEnd Version
Mod_nssMod_nss_project*1.0.8 (including)
Mod_nssMod_nss_project1.0 (including)1.0 (including)
Mod_nssMod_nss_project1.0.2 (including)1.0.2 (including)
Mod_nssMod_nss_project1.0.3 (including)1.0.3 (including)
Mod_nssMod_nss_project1.0.4 (including)1.0.4 (including)
Mod_nssMod_nss_project1.0.5 (including)1.0.5 (including)
Mod_nssMod_nss_project1.0.6 (including)1.0.6 (including)
Mod_nssMod_nss_project1.0.7 (including)1.0.7 (including)
Red Hat Enterprise Linux 5RedHatmod_nss-0:1.0.8-8.el5_10*
Red Hat Enterprise Linux 6RedHatmod_nss-0:1.0.8-19.el6_5*
Libapache2-mod-nssUbuntuartful*
Libapache2-mod-nssUbuntubionic*
Libapache2-mod-nssUbuntucosmic*
Libapache2-mod-nssUbuntuesm-apps/bionic*
Libapache2-mod-nssUbuntuesm-apps/xenial*
Libapache2-mod-nssUbuntuprecise*
Libapache2-mod-nssUbuntuquantal*
Libapache2-mod-nssUbunturaring*
Libapache2-mod-nssUbuntusaucy*
Libapache2-mod-nssUbuntutrusty*
Libapache2-mod-nssUbuntuupstream*
Libapache2-mod-nssUbuntuutopic*
Libapache2-mod-nssUbuntuvivid*
Libapache2-mod-nssUbuntuwily*
Libapache2-mod-nssUbuntuxenial*
Libapache2-mod-nssUbuntuyakkety*
Libapache2-mod-nssUbuntuzesty*

References