ID CVE-2005-2700
Summary ssl_engine_kernel.c in mod_ssl before 2.8.24, when using "SSLVerifyClient optional" in the global virtual host configuration, does not properly enforce "SSLVerifyClient require" in a per-location context, which allows remote attackers to bypass intended access restrictions.
References
Vulnerable Configurations
  • Apache Software Foundation Apache HTTP Server 2.0
    cpe:2.3:a:apache:http_server:2.0
  • Apache Software Foundation Apache HTTP Server 2.0.9a
    cpe:2.3:a:apache:http_server:2.0.9
  • Apache Software Foundation Apache HTTP Server 2.0.28
    cpe:2.3:a:apache:http_server:2.0.28
  • Apache Software Foundation Apache HTTP Server 2.0.28 Beta
    cpe:2.3:a:apache:http_server:2.0.28:beta
  • Apache Software Foundation Apache HTTP Server 2.0.32
    cpe:2.3:a:apache:http_server:2.0.32
  • Apache Software Foundation Apache HTTP Server 2.0.35
    cpe:2.3:a:apache:http_server:2.0.35
  • Apache Software Foundation Apache HTTP Server 2.0.36
    cpe:2.3:a:apache:http_server:2.0.36
  • Apache Software Foundation Apache HTTP Server 2.0.37
    cpe:2.3:a:apache:http_server:2.0.37
  • Apache Software Foundation Apache HTTP Server 2.0.38
    cpe:2.3:a:apache:http_server:2.0.38
  • Apache Software Foundation Apache HTTP Server 2.0.39
    cpe:2.3:a:apache:http_server:2.0.39
  • Apache Software Foundation Apache HTTP Server 2.0.40
    cpe:2.3:a:apache:http_server:2.0.40
  • Apache Software Foundation Apache HTTP Server 2.0.41
    cpe:2.3:a:apache:http_server:2.0.41
  • Apache Software Foundation Apache HTTP Server 2.0.42
    cpe:2.3:a:apache:http_server:2.0.42
  • Apache Software Foundation Apache HTTP Server 2.0.43
    cpe:2.3:a:apache:http_server:2.0.43
  • Apache Software Foundation Apache HTTP Server 2.0.44
    cpe:2.3:a:apache:http_server:2.0.44
  • Apache Software Foundation Apache HTTP Server 2.0.45
    cpe:2.3:a:apache:http_server:2.0.45
  • Apache Software Foundation Apache HTTP Server 2.0.46
    cpe:2.3:a:apache:http_server:2.0.46
  • Apache Software Foundation Apache HTTP Server 2.0.47
    cpe:2.3:a:apache:http_server:2.0.47
  • Apache Software Foundation Apache HTTP Server 2.0.48
    cpe:2.3:a:apache:http_server:2.0.48
  • Apache Software Foundation Apache HTTP Server 2.0.49
    cpe:2.3:a:apache:http_server:2.0.49
  • Apache Software Foundation Apache HTTP Server 2.0.50
    cpe:2.3:a:apache:http_server:2.0.50
  • Apache Software Foundation Apache HTTP Server 2.0.51
    cpe:2.3:a:apache:http_server:2.0.51
  • Apache Software Foundation Apache HTTP Server 2.0.52
    cpe:2.3:a:apache:http_server:2.0.52
  • Apache Software Foundation Apache HTTP Server 2.0.53
    cpe:2.3:a:apache:http_server:2.0.53
  • Apache Software Foundation Apache HTTP Server 2.0.54
    cpe:2.3:a:apache:http_server:2.0.54
  • Apache Software Foundation Apache HTTP Server 2.1
    cpe:2.3:a:apache:http_server:2.1
  • Apache Software Foundation Apache HTTP Server 2.1.1
    cpe:2.3:a:apache:http_server:2.1.1
  • Apache Software Foundation Apache HTTP Server 2.1.2
    cpe:2.3:a:apache:http_server:2.1.2
  • Apache Software Foundation Apache HTTP Server 2.1.3
    cpe:2.3:a:apache:http_server:2.1.3
  • Apache Software Foundation Apache HTTP Server 2.1.4
    cpe:2.3:a:apache:http_server:2.1.4
  • Apache Software Foundation Apache HTTP Server 2.1.5
    cpe:2.3:a:apache:http_server:2.1.5
  • Apache Software Foundation Apache HTTP Server 2.1.6
    cpe:2.3:a:apache:http_server:2.1.6
  • cpe:2.3:a:mod_ssl:mod_ssl:2.0.15
    cpe:2.3:a:mod_ssl:mod_ssl:2.0.15
  • cpe:2.3:a:mod_ssl:mod_ssl:2.1.8
    cpe:2.3:a:mod_ssl:mod_ssl:2.1.8
  • cpe:2.3:a:mod_ssl:mod_ssl:2.2.8
    cpe:2.3:a:mod_ssl:mod_ssl:2.2.8
  • cpe:2.3:a:mod_ssl:mod_ssl:2.3.11
    cpe:2.3:a:mod_ssl:mod_ssl:2.3.11
  • cpe:2.3:a:mod_ssl:mod_ssl:2.4.10
    cpe:2.3:a:mod_ssl:mod_ssl:2.4.10
  • cpe:2.3:a:mod_ssl:mod_ssl:2.5.1
    cpe:2.3:a:mod_ssl:mod_ssl:2.5.1
  • cpe:2.3:a:mod_ssl:mod_ssl:2.6.6
    cpe:2.3:a:mod_ssl:mod_ssl:2.6.6
  • cpe:2.3:a:mod_ssl:mod_ssl:2.7.1
    cpe:2.3:a:mod_ssl:mod_ssl:2.7.1
  • cpe:2.3:a:mod_ssl:mod_ssl:2.8.14
    cpe:2.3:a:mod_ssl:mod_ssl:2.8.14
  • cpe:2.3:a:mod_ssl:mod_ssl:2.8.15
    cpe:2.3:a:mod_ssl:mod_ssl:2.8.15
  • cpe:2.3:a:mod_ssl:mod_ssl:2.8.16
    cpe:2.3:a:mod_ssl:mod_ssl:2.8.16
  • cpe:2.3:a:mod_ssl:mod_ssl:2.8.18
    cpe:2.3:a:mod_ssl:mod_ssl:2.8.18
  • cpe:2.3:a:mod_ssl:mod_ssl:2.8.19
    cpe:2.3:a:mod_ssl:mod_ssl:2.8.19
  • cpe:2.3:a:mod_ssl:mod_ssl:2.8.20
    cpe:2.3:a:mod_ssl:mod_ssl:2.8.20
  • cpe:2.3:a:mod_ssl:mod_ssl:2.8.21
    cpe:2.3:a:mod_ssl:mod_ssl:2.8.21
  • cpe:2.3:a:mod_ssl:mod_ssl:2.8.22
    cpe:2.3:a:mod_ssl:mod_ssl:2.8.22
  • cpe:2.3:a:mod_ssl:mod_ssl:2.8.23
    cpe:2.3:a:mod_ssl:mod_ssl:2.8.23
  • cpe:2.3:a:mod_ssl:mod_ssl:2.8.24
    cpe:2.3:a:mod_ssl:mod_ssl:2.8.24
  • cpe:2.3:o:redhat:enterprise_linux:3.0:-:advanced_servers
    cpe:2.3:o:redhat:enterprise_linux:3.0:-:advanced_servers
  • cpe:2.3:o:redhat:enterprise_linux:3.0:-:enterprise_server
    cpe:2.3:o:redhat:enterprise_linux:3.0:-:enterprise_server
  • cpe:2.3:o:redhat:enterprise_linux:3.0:-:workstation
    cpe:2.3:o:redhat:enterprise_linux:3.0:-:workstation
  • cpe:2.3:o:redhat:enterprise_linux:4.0:-:advanced_server
    cpe:2.3:o:redhat:enterprise_linux:4.0:-:advanced_server
  • cpe:2.3:o:redhat:enterprise_linux:4.0:-:enterprise_server
    cpe:2.3:o:redhat:enterprise_linux:4.0:-:enterprise_server
  • cpe:2.3:o:redhat:enterprise_linux:4.0:-:workstation
    cpe:2.3:o:redhat:enterprise_linux:4.0:-:workstation
  • Red Hat Desktop 3.0
    cpe:2.3:o:redhat:enterprise_linux_desktop:3.0
  • Red Hat Desktop 4.0
    cpe:2.3:o:redhat:enterprise_linux_desktop:4.0
CVSS
Base: 10.0 (as of 07-09-2005 - 08:45)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
nessus via4
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2005-773.NASL
    description An updated mod_ssl package for Apache that corrects a security issue is now available. This update has been rated as having important security impact by the Red Hat Security Response Team. The mod_ssl module provides strong cryptography for the Apache Web server via the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. A flaw was discovered in mod_ssl's handling of the 'SSLVerifyClient' directive. This flaw occurs if a virtual host is configured using 'SSLVerifyClient optional' and a directive 'SSLVerifyClient required' is set for a specific location. For servers configured in this fashion, an attacker may be able to access resources that should otherwise be protected, by not supplying a client certificate when connecting. The Common Vulnerabilities and Exposures project assigned the name CVE-2005-2700 to this issue. Users of mod_ssl should upgrade to this updated package, which contains a backported patch to correct this issue.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 19714
    published 2005-09-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=19714
    title RHEL 2.1 : mod_ssl (RHSA-2005:773)
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_SECUPD2005-009.NASL
    description The remote host is running Apple Mac OS X, but lacks Security Update 2005-009. This security update contains fixes for the following applications : - Apache2 - Apache_mod_ssl - CoreFoundation - curl - iodbcadmintool - OpenSSL - passwordserver - Safari - sudo - syslog
    last seen 2019-02-21
    modified 2018-07-14
    plugin id 20249
    published 2005-11-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=20249
    title Mac OS X Multiple Vulnerabilities (Security Update 2005-009)
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2005-251-02.NASL
    description New mod_ssl packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, and -current to fix a security issue. If 'SSLVerifyClient optional' was configured in the global section of the config file, it could improperly override 'SSLVerifyClient require' in a per-location section.
    last seen 2019-02-21
    modified 2018-08-09
    plugin id 19862
    published 2005-10-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=19862
    title Slackware 10.0 / 10.1 / 8.1 / 9.0 / 9.1 / current : mod_ssl (SSA:2005-251-02)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-200509-12.NASL
    description The remote host is affected by the vulnerability described in GLSA-200509-12 (Apache, mod_ssl: Multiple vulnerabilities) mod_ssl contains a security issue when 'SSLVerifyClient optional' is configured in the global virtual host configuration (CAN-2005-2700). Also, Apache's httpd includes a PCRE library, which makes it vulnerable to an integer overflow (CAN-2005-2491). Impact : Under a specific configuration, mod_ssl does not properly enforce the client-based certificate authentication directive, 'SSLVerifyClient require', in a per-location context, which could be potentially used by a remote attacker to bypass some restrictions. By creating a specially crafted '.htaccess' file, a local attacker could possibly exploit Apache's vulnerability, which would result in a local privilege escalation. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 19811
    published 2005-10-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=19811
    title GLSA-200509-12 : Apache, mod_ssl: Multiple vulnerabilities
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2005-608.NASL
    description Updated Apache httpd packages that correct two security issues are now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having important security impact by the Red Hat Security Response Team. The Apache HTTP Server is a popular and freely-available Web server. A flaw was discovered in mod_ssl's handling of the 'SSLVerifyClient' directive. This flaw occurs if a virtual host is configured using 'SSLVerifyClient optional' and a directive 'SSLVerifyClient required' is set for a specific location. For servers configured in this fashion, an attacker may be able to access resources that should otherwise be protected, by not supplying a client certificate when connecting. The Common Vulnerabilities and Exposures project assigned the name CVE-2005-2700 to this issue. A flaw was discovered in Apache httpd where the byterange filter would buffer certain responses into memory. If a server has a dynamic resource such as a CGI script or PHP script that generates a large amount of data, an attacker could send carefully crafted requests in order to consume resources, potentially leading to a Denial of Service. (CVE-2005-2728) Users of Apache httpd should update to these errata packages that contain backported patches to correct these issues.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 19673
    published 2005-09-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=19673
    title RHEL 3 / 4 : httpd (RHSA-2005:608)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-807.NASL
    description A problem has been discovered in mod_ssl, which provides strong cryptography (HTTPS support) for Apache that allows remote attackers to bypass access restrictions.
    last seen 2019-02-21
    modified 2018-07-20
    plugin id 19682
    published 2005-09-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=19682
    title Debian DSA-807-1 : libapache-mod-ssl - acl restriction bypass
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-805.NASL
    description Several problems have been discovered in Apache2, the next generation, scalable, extendable web server. The Common Vulnerabilities and Exposures project identifies the following problems : - CAN-2005-1268 Marc Stern discovered an off-by-one error in the mod_ssl Certificate Revocation List (CRL) verification callback. When Apache is configured to use a CRL this can be used to cause a denial of service. - CAN-2005-2088 A vulnerability has been discovered in the Apache web server. When it is acting as an HTTP proxy, it allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct cross-site scripting attacks, which causes Apache to incorrectly handle and forward the body of the request. - CAN-2005-2700 A problem has been discovered in mod_ssl, which provides strong cryptography (HTTPS support) for Apache that allows remote attackers to bypass access restrictions. - CAN-2005-2728 The byte-range filter in Apache 2.0 allows remote attackers to cause a denial of service via an HTTP header with a large Range field.
    last seen 2019-02-21
    modified 2018-07-20
    plugin id 19612
    published 2005-09-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=19612
    title Debian DSA-805-1 : apache2 - several vulnerabilities
  • NASL family Mandriva Local Security Checks
    NASL id MANDRAKE_MDKSA-2005-161.NASL
    description A flaw was discovered in mod_ssl's handling of the 'SSLVerifyClient' directive. This flaw occurs if a virtual host is configured using 'SSLVerifyClient optional' and a directive 'SSLVerifyClient required' is set for a specific location. For servers configured in this fashion, an attacker may be able to access resources that should otherwise be protected, by not supplying a client certificate when connecting. (CVE-2005-2700) A flaw was discovered in Apache httpd where the byterange filter would buffer certain responses into memory. If a server has a dynamic resource such as a CGI script or PHP script that generates a large amount of data, an attacker could send carefully crafted requests in order to consume resources, potentially leading to a Denial of Service. (CVE-2005-2728) The updated packages have been patched to address these issues.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 19916
    published 2005-10-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=19916
    title Mandrake Linux Security Advisory : apache2 (MDKSA-2005:161)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2005-608.NASL
    description Updated Apache httpd packages that correct two security issues are now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having important security impact by the Red Hat Security Response Team. The Apache HTTP Server is a popular and freely-available Web server. A flaw was discovered in mod_ssl's handling of the 'SSLVerifyClient' directive. This flaw occurs if a virtual host is configured using 'SSLVerifyClient optional' and a directive 'SSLVerifyClient required' is set for a specific location. For servers configured in this fashion, an attacker may be able to access resources that should otherwise be protected, by not supplying a client certificate when connecting. The Common Vulnerabilities and Exposures project assigned the name CVE-2005-2700 to this issue. A flaw was discovered in Apache httpd where the byterange filter would buffer certain responses into memory. If a server has a dynamic resource such as a CGI script or PHP script that generates a large amount of data, an attacker could send carefully crafted requests in order to consume resources, potentially leading to a Denial of Service. (CVE-2005-2728) Users of Apache httpd should update to these errata packages that contain backported patches to correct these issues.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 21845
    published 2006-07-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21845
    title CentOS 3 / 4 : httpd (CESA-2005:608)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-177-1.NASL
    description Apache did not honour the 'SSLVerifyClient require' directive within a block if the surrounding block contained a directive 'SSLVerifyClient optional'. This allowed clients to bypass client certificate validation on servers with the above configuration. (CAN-2005-2700) Filip Sneppe discovered a Denial of Service vulnerability in the byte range filter handler. By requesting certain large byte ranges, a remote attacker could cause memory exhaustion in the server. (CAN-2005-2728) The updated libapache-mod-ssl also fixes two older Denial of Service vulnerabilities: A format string error in the ssl_log() function which could be exploited to crash the server (CAN-2004-0700), and a flaw in the SSL cipher negotiation which could be exploited to terminate a session (CAN-2004-0885). Please note that Apache 1.3 and libapache-mod-ssl are not officially supported (they are in the 'universe' component of the Ubuntu archive). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 20587
    published 2006-01-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=20587
    title Ubuntu 4.10 / 5.04 : apache2, libapache-mod-ssl vulnerabilities (USN-177-1)
  • NASL family Web Servers
    NASL id APACHE_2_0_55.NASL
    description The remote host appears to be running a version of Apache that is prior to 2.0.55. It is, therefore affected by multiple vulnerabilities : - A security issue exists where 'SSLVerifyClient' is not enforced in per-location context if 'SSLVerifyClient optional' is configured in the vhost configuration. (CVE-2005-2700) - A denial of service vulnerability exists when processing a large byte range request, as well as a flaw in the 'worker.c' module which could allow an attacker to force this service to consume excessive amounts of memory. (CVE-2005-2970) - When Apache is acting as a proxy, it is possible for a remote attacker to poison the web cache, bypass web application firewall protection, and conduct cross-site scripting attacks via an HTTP request with both a 'Transfer-Encoding: chunked' header and a 'Content-Length' header. (CVE-2005-2088) - Multiple integer overflows exists in PCRE in quantifier parsing which could be triggered by a local user through use of a specially crafted regex in an .htaccess file. (CVE-2005-2491) - An issue exists where the byte range filter buffers responses into memory. (CVE-2005-2728) - An off-by-one overflow exists in mod_ssl while printing CRL information at 'LogLevel debug' which could be triggered if configured to use a 'malicious CRL'. (CVE-2005-1268)
    last seen 2019-02-21
    modified 2018-06-29
    plugin id 31656
    published 2008-03-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=31656
    title Apache < 2.0.55 Multiple Vulnerabilities
oval via4
accepted 2013-04-29T04:05:28.938-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 3
    oval oval:org.mitre.oval:def:11782
  • comment CentOS Linux 3.x
    oval oval:org.mitre.oval:def:16651
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
description ssl_engine_kernel.c in mod_ssl before 2.8.24, when using "SSLVerifyClient optional" in the global virtual host configuration, does not properly enforce "SSLVerifyClient require" in a per-location context, which allows remote attackers to bypass intended access restrictions.
family unix
id oval:org.mitre.oval:def:10416
status accepted
submitted 2010-07-09T03:56:16-04:00
title ssl_engine_kernel.c in mod_ssl before 2.8.24, when using "SSLVerifyClient optional" in the global virtual host configuration, does not properly enforce "SSLVerifyClient require" in a per-location context, which allows remote attackers to bypass intended access restrictions.
version 23
redhat via4
advisories
  • rhsa
    id RHSA-2005:608
  • rhsa
    id RHSA-2005:773
  • rhsa
    id RHSA-2005:816
refmap via4
bid 14721
cert-vn VU#744929
confirm
debian
  • DSA-805
  • DSA-807
gentoo GLSA-200509-12
hp
  • HPSBUX01232
  • SSRT051043
mandriva MDKSA-2005:161
mlist [apache-modssl] 20050902 [ANNOUNCE] mod_ssl 2.8.24-1.3.33
openpkg OpenPKG-SA-2005.017
osvdb 19188
secunia
  • 16700
  • 16705
  • 16714
  • 16743
  • 16746
  • 16748
  • 16753
  • 16754
  • 16769
  • 16771
  • 16789
  • 16864
  • 16956
  • 17088
  • 17288
  • 17311
  • 17813
  • 19072
  • 19073
  • 21848
  • 22523
sunalert
  • 102197
  • 102198
suse
  • SUSE-SA:2005:051
  • SUSE-SA:2005:052
  • SuSE-SA:2006:051
trustix TSLSA-2005-0059
ubuntu USN-177-1
vupen
  • ADV-2005-1625
  • ADV-2005-2659
  • ADV-2006-0789
  • ADV-2006-4207
statements via4
contributor Mark J Cox
lastmodified 2008-07-02
organization Apache
statement Fixed in Apache HTTP server 2.0.55: http://httpd.apache.org/security/vulnerabilities_20.html
Last major update 21-11-2016 - 21:59
Published 06-09-2005 - 19:03
Last modified 10-10-2017 - 21:30
Back to Top