|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for mod_nss RHSA-2013:1779-01|
|Summary:||The remote host is missing an update for the 'mod_nss'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'mod_nss'
package(s) announced via the referenced advisory.
The mod_nss module provides strong cryptography for the Apache HTTP Server
via the Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
protocols, using the Network Security Services (NSS) security library.
A flaw was found in the way mod_nss handled the NSSVerifyClient setting for
the per-directory context. When configured to not require a client
certificate for the initial connection and only require it for a specific
directory, mod_nss failed to enforce this requirement and allowed a client
to access the directory when no valid client certificate was provided.
Red Hat would like to thank Albert Smith of OUSD(AT& L) for reporting this
All mod_nss users should upgrade to this updated package, which contains a
backported patch to correct this issue. The httpd service must be restarted
for this update to take effect.
mod_nss on Red Hat Enterprise Linux (v. 5 server),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2013-4566|
RedHat Security Advisories: RHSA-2013:1779
SuSE Security Announcement: openSUSE-SU-2013:1956 (Google Search)
|Copyright||Copyright (C) 2013 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.