ID CVE-2015-2091
Summary The authentication hook (mgs_hook_authz) in mod-gnutls 0.5.10 and earlier does not validate client certificates when "GnuTLSClientVerify require" is set, which allows remote attackers to spoof clients via a crafted certificate.
References
Vulnerable Configurations
  • cpe:2.3:a:apache:mod-gnutls:*:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod-gnutls:*:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 19-09-2017 - 01:36)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:N
refmap via4
confirm https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=578663
debian DSA-3177
gentoo GLSA-201709-04
misc http://issues.outoforder.cc/view.php?id=93
Last major update 19-09-2017 - 01:36
Published 13-03-2015 - 14:59
Last modified 19-09-2017 - 01:36
Back to Top