Access Restriction Bypass Affecting libapache2-mod-nss package, versions <1.0.8-4


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.35% (72nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN9-LIBAPACHE2MODNSS-284514
  • published12 Dec 2013
  • disclosed12 Dec 2013

Introduced: 12 Dec 2013

CVE-2013-4566  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

Upgrade Debian:9 libapache2-mod-nss to version 1.0.8-4 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libapache2-mod-nss package and not the libapache2-mod-nss package as distributed by Debian. See How to fix? for Debian:9 relevant fixed versions and status.

mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to bypass intended access restrictions.

CVSS Scores

version 3.1