Description: | Summary: The remote host is missing an update for the 'mod_ssl' package(s) announced via the SSA:2005-251-02 advisory.
Vulnerability Insight: New mod_ssl packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, and -current to fix a security issue. If 'SSLVerifyClient optional' was configured in the global section of the config file, it could improperly override 'SSLVerifyClient require' in a per-location section.
More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:
[link moved to references]
Here are the details from the Slackware 10.1 ChangeLog: +--------------------------+ patches/packages/mod_ssl-2.8.24_1.3.33-i486-1.tgz: Upgraded to mod_ssl-2.8.24-1.3.33. From the CHANGES file: Fix a security issue (CAN-2005-2700) where 'SSLVerifyClient require' was not enforced in per-location context if 'SSLVerifyClient optional' was configured in the global virtual host configuration. For more information, see: [link moved to references] (* Security fix *) +--------------------------+
Affected Software/OS: 'mod_ssl' package(s) on Slackware 8.1, Slackware 9.0, Slackware 9.1, Slackware 10.0, Slackware 10.1, Slackware current.
Solution: Please install the updated package(s).
CVSS Score: 10.0
CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
|