rhba-2011:1656
Vulnerability from csaf_redhat
Published
2011-12-05 19:50
Modified
2024-11-22 04:32
Summary
Red Hat Bug Fix Advisory: mod_nss bug fix update

Notes

Topic
An updated mod_nss package that fixes several bugs is now available for Red Hat Enterprise Linux 6.
Details
The mod_nss module provides strong cryptography for the Apache HTTP Server via the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, using the Network Security Services (NSS) security library. This update fixes the following bugs: * When the NSS library was not initialized and mod_nss tried to clear its SSL cache on start-up, mod_nss terminated unexpectedly when the NSS library was built with debugging enabled. With this update, mod_nss does not try to clear the SSL cache in the described scenario, thus preventing this bug. (BZ#691502) * Previously, a static array containing the arguments for launching the nss_pcache command was overflowing the size by one. This could lead to a variety of issues including unexpected termination. This bug has been fixed, and mod_nss now uses properly sized static array when launching nss_pcache. (BZ#714154) * Prior to this update, client certificates were only retrieved during the initial SSL handshake if the NSSVerifyClient option was set to "require" or "optional". Also, the FakeBasicAuth option only retrieved Common Name rather than the entire certificate subject. Consequently, it was possible to spoof an identity using that option. This bug has been fixed, the FakeBasicAuth option is now prefixed with "/" and is thus compatible with OpenSSL, and certificates are now retrieved on all subsequent requests beyond the first one. (BZ#702437) Users of mod_nss are advised to upgrade to this updated package, which fixes these bugs.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An updated mod_nss package that fixes several bugs is now available for Red Hat Enterprise Linux 6.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The mod_nss module provides strong cryptography for the Apache HTTP Server via the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, using the Network Security Services (NSS) security library.\n\nThis update fixes the following bugs: \n\n* When the NSS library was not initialized and mod_nss tried to clear its SSL cache on start-up, mod_nss terminated unexpectedly when the NSS library was built with debugging enabled. With this update, mod_nss does not try to clear the SSL cache in the described scenario, thus preventing this bug. (BZ#691502)\n\n* Previously, a static array containing the arguments for launching the nss_pcache command was overflowing the size by one. This could lead to a variety of issues including unexpected termination. This bug has been fixed, and mod_nss now uses properly sized static array when launching nss_pcache. (BZ#714154)\n\n* Prior to this update, client certificates were only retrieved during the initial SSL handshake if the NSSVerifyClient option was set to \"require\" or \"optional\". Also, the FakeBasicAuth option only retrieved Common Name rather than the entire certificate subject. Consequently, it was possible to spoof an identity using that option. This bug has been fixed, the FakeBasicAuth option is now prefixed with \"/\" and is thus compatible with OpenSSL, and certificates are now retrieved on all subsequent requests beyond the first one. (BZ#702437)\n\nUsers of mod_nss are advised to upgrade to this updated package, which fixes these bugs.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHBA-2011:1656",
        "url": "https://access.redhat.com/errata/RHBA-2011:1656"
      },
      {
        "category": "external",
        "summary": "702437",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=702437"
      },
      {
        "category": "external",
        "summary": "714154",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=714154"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhba-2011_1656.json"
      }
    ],
    "title": "Red Hat Bug Fix Advisory: mod_nss bug fix update ",
    "tracking": {
      "current_release_date": "2024-11-22T04:32:53+00:00",
      "generator": {
        "date": "2024-11-22T04:32:53+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHBA-2011:1656",
      "initial_release_date": "2011-12-05T19:50:24+00:00",
      "revision_history": [
        {
          "date": "2011-12-05T19:50:24+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2011-12-05T19:50:24+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T04:32:53+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
                  "product_id": "6Client-optional",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
                  "product_id": "6ComputeNode-optional",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 6)",
                  "product_id": "6Server",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 6)",
                  "product_id": "6Workstation",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_nss-0:1.0.8-13.el6.i686",
                "product": {
                  "name": "mod_nss-0:1.0.8-13.el6.i686",
                  "product_id": "mod_nss-0:1.0.8-13.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_nss@1.0.8-13.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_nss-debuginfo-0:1.0.8-13.el6.i686",
                "product": {
                  "name": "mod_nss-debuginfo-0:1.0.8-13.el6.i686",
                  "product_id": "mod_nss-debuginfo-0:1.0.8-13.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_nss-debuginfo@1.0.8-13.el6?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_nss-0:1.0.8-13.el6.src",
                "product": {
                  "name": "mod_nss-0:1.0.8-13.el6.src",
                  "product_id": "mod_nss-0:1.0.8-13.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_nss@1.0.8-13.el6?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_nss-0:1.0.8-13.el6.x86_64",
                "product": {
                  "name": "mod_nss-0:1.0.8-13.el6.x86_64",
                  "product_id": "mod_nss-0:1.0.8-13.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_nss@1.0.8-13.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_nss-debuginfo-0:1.0.8-13.el6.x86_64",
                "product": {
                  "name": "mod_nss-debuginfo-0:1.0.8-13.el6.x86_64",
                  "product_id": "mod_nss-debuginfo-0:1.0.8-13.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_nss-debuginfo@1.0.8-13.el6?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_nss-0:1.0.8-13.el6.ppc64",
                "product": {
                  "name": "mod_nss-0:1.0.8-13.el6.ppc64",
                  "product_id": "mod_nss-0:1.0.8-13.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_nss@1.0.8-13.el6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_nss-debuginfo-0:1.0.8-13.el6.ppc64",
                "product": {
                  "name": "mod_nss-debuginfo-0:1.0.8-13.el6.ppc64",
                  "product_id": "mod_nss-debuginfo-0:1.0.8-13.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_nss-debuginfo@1.0.8-13.el6?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_nss-0:1.0.8-13.el6.s390x",
                "product": {
                  "name": "mod_nss-0:1.0.8-13.el6.s390x",
                  "product_id": "mod_nss-0:1.0.8-13.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_nss@1.0.8-13.el6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_nss-debuginfo-0:1.0.8-13.el6.s390x",
                "product": {
                  "name": "mod_nss-debuginfo-0:1.0.8-13.el6.s390x",
                  "product_id": "mod_nss-debuginfo-0:1.0.8-13.el6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_nss-debuginfo@1.0.8-13.el6?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-0:1.0.8-13.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional:mod_nss-0:1.0.8-13.el6.i686"
        },
        "product_reference": "mod_nss-0:1.0.8-13.el6.i686",
        "relates_to_product_reference": "6Client-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-0:1.0.8-13.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional:mod_nss-0:1.0.8-13.el6.ppc64"
        },
        "product_reference": "mod_nss-0:1.0.8-13.el6.ppc64",
        "relates_to_product_reference": "6Client-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-0:1.0.8-13.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional:mod_nss-0:1.0.8-13.el6.s390x"
        },
        "product_reference": "mod_nss-0:1.0.8-13.el6.s390x",
        "relates_to_product_reference": "6Client-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-0:1.0.8-13.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional:mod_nss-0:1.0.8-13.el6.src"
        },
        "product_reference": "mod_nss-0:1.0.8-13.el6.src",
        "relates_to_product_reference": "6Client-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-0:1.0.8-13.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional:mod_nss-0:1.0.8-13.el6.x86_64"
        },
        "product_reference": "mod_nss-0:1.0.8-13.el6.x86_64",
        "relates_to_product_reference": "6Client-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-debuginfo-0:1.0.8-13.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional:mod_nss-debuginfo-0:1.0.8-13.el6.i686"
        },
        "product_reference": "mod_nss-debuginfo-0:1.0.8-13.el6.i686",
        "relates_to_product_reference": "6Client-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-debuginfo-0:1.0.8-13.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional:mod_nss-debuginfo-0:1.0.8-13.el6.ppc64"
        },
        "product_reference": "mod_nss-debuginfo-0:1.0.8-13.el6.ppc64",
        "relates_to_product_reference": "6Client-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-debuginfo-0:1.0.8-13.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional:mod_nss-debuginfo-0:1.0.8-13.el6.s390x"
        },
        "product_reference": "mod_nss-debuginfo-0:1.0.8-13.el6.s390x",
        "relates_to_product_reference": "6Client-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-debuginfo-0:1.0.8-13.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional:mod_nss-debuginfo-0:1.0.8-13.el6.x86_64"
        },
        "product_reference": "mod_nss-debuginfo-0:1.0.8-13.el6.x86_64",
        "relates_to_product_reference": "6Client-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-0:1.0.8-13.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional:mod_nss-0:1.0.8-13.el6.i686"
        },
        "product_reference": "mod_nss-0:1.0.8-13.el6.i686",
        "relates_to_product_reference": "6ComputeNode-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-0:1.0.8-13.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional:mod_nss-0:1.0.8-13.el6.ppc64"
        },
        "product_reference": "mod_nss-0:1.0.8-13.el6.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-0:1.0.8-13.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional:mod_nss-0:1.0.8-13.el6.s390x"
        },
        "product_reference": "mod_nss-0:1.0.8-13.el6.s390x",
        "relates_to_product_reference": "6ComputeNode-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-0:1.0.8-13.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional:mod_nss-0:1.0.8-13.el6.src"
        },
        "product_reference": "mod_nss-0:1.0.8-13.el6.src",
        "relates_to_product_reference": "6ComputeNode-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-0:1.0.8-13.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional:mod_nss-0:1.0.8-13.el6.x86_64"
        },
        "product_reference": "mod_nss-0:1.0.8-13.el6.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-debuginfo-0:1.0.8-13.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional:mod_nss-debuginfo-0:1.0.8-13.el6.i686"
        },
        "product_reference": "mod_nss-debuginfo-0:1.0.8-13.el6.i686",
        "relates_to_product_reference": "6ComputeNode-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-debuginfo-0:1.0.8-13.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional:mod_nss-debuginfo-0:1.0.8-13.el6.ppc64"
        },
        "product_reference": "mod_nss-debuginfo-0:1.0.8-13.el6.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-debuginfo-0:1.0.8-13.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional:mod_nss-debuginfo-0:1.0.8-13.el6.s390x"
        },
        "product_reference": "mod_nss-debuginfo-0:1.0.8-13.el6.s390x",
        "relates_to_product_reference": "6ComputeNode-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-debuginfo-0:1.0.8-13.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional:mod_nss-debuginfo-0:1.0.8-13.el6.x86_64"
        },
        "product_reference": "mod_nss-debuginfo-0:1.0.8-13.el6.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-0:1.0.8-13.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server:mod_nss-0:1.0.8-13.el6.i686"
        },
        "product_reference": "mod_nss-0:1.0.8-13.el6.i686",
        "relates_to_product_reference": "6Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-0:1.0.8-13.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server:mod_nss-0:1.0.8-13.el6.ppc64"
        },
        "product_reference": "mod_nss-0:1.0.8-13.el6.ppc64",
        "relates_to_product_reference": "6Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-0:1.0.8-13.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server:mod_nss-0:1.0.8-13.el6.s390x"
        },
        "product_reference": "mod_nss-0:1.0.8-13.el6.s390x",
        "relates_to_product_reference": "6Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-0:1.0.8-13.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server:mod_nss-0:1.0.8-13.el6.src"
        },
        "product_reference": "mod_nss-0:1.0.8-13.el6.src",
        "relates_to_product_reference": "6Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-0:1.0.8-13.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server:mod_nss-0:1.0.8-13.el6.x86_64"
        },
        "product_reference": "mod_nss-0:1.0.8-13.el6.x86_64",
        "relates_to_product_reference": "6Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-debuginfo-0:1.0.8-13.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server:mod_nss-debuginfo-0:1.0.8-13.el6.i686"
        },
        "product_reference": "mod_nss-debuginfo-0:1.0.8-13.el6.i686",
        "relates_to_product_reference": "6Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-debuginfo-0:1.0.8-13.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server:mod_nss-debuginfo-0:1.0.8-13.el6.ppc64"
        },
        "product_reference": "mod_nss-debuginfo-0:1.0.8-13.el6.ppc64",
        "relates_to_product_reference": "6Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-debuginfo-0:1.0.8-13.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server:mod_nss-debuginfo-0:1.0.8-13.el6.s390x"
        },
        "product_reference": "mod_nss-debuginfo-0:1.0.8-13.el6.s390x",
        "relates_to_product_reference": "6Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-debuginfo-0:1.0.8-13.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server:mod_nss-debuginfo-0:1.0.8-13.el6.x86_64"
        },
        "product_reference": "mod_nss-debuginfo-0:1.0.8-13.el6.x86_64",
        "relates_to_product_reference": "6Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-0:1.0.8-13.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation:mod_nss-0:1.0.8-13.el6.i686"
        },
        "product_reference": "mod_nss-0:1.0.8-13.el6.i686",
        "relates_to_product_reference": "6Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-0:1.0.8-13.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation:mod_nss-0:1.0.8-13.el6.ppc64"
        },
        "product_reference": "mod_nss-0:1.0.8-13.el6.ppc64",
        "relates_to_product_reference": "6Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-0:1.0.8-13.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation:mod_nss-0:1.0.8-13.el6.s390x"
        },
        "product_reference": "mod_nss-0:1.0.8-13.el6.s390x",
        "relates_to_product_reference": "6Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-0:1.0.8-13.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation:mod_nss-0:1.0.8-13.el6.src"
        },
        "product_reference": "mod_nss-0:1.0.8-13.el6.src",
        "relates_to_product_reference": "6Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-0:1.0.8-13.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation:mod_nss-0:1.0.8-13.el6.x86_64"
        },
        "product_reference": "mod_nss-0:1.0.8-13.el6.x86_64",
        "relates_to_product_reference": "6Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-debuginfo-0:1.0.8-13.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation:mod_nss-debuginfo-0:1.0.8-13.el6.i686"
        },
        "product_reference": "mod_nss-debuginfo-0:1.0.8-13.el6.i686",
        "relates_to_product_reference": "6Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-debuginfo-0:1.0.8-13.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation:mod_nss-debuginfo-0:1.0.8-13.el6.ppc64"
        },
        "product_reference": "mod_nss-debuginfo-0:1.0.8-13.el6.ppc64",
        "relates_to_product_reference": "6Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-debuginfo-0:1.0.8-13.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation:mod_nss-debuginfo-0:1.0.8-13.el6.s390x"
        },
        "product_reference": "mod_nss-debuginfo-0:1.0.8-13.el6.s390x",
        "relates_to_product_reference": "6Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_nss-debuginfo-0:1.0.8-13.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation:mod_nss-debuginfo-0:1.0.8-13.el6.x86_64"
        },
        "product_reference": "mod_nss-debuginfo-0:1.0.8-13.el6.x86_64",
        "relates_to_product_reference": "6Workstation"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2011-4973",
      "discovery_date": "2012-02-29T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1017197"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Authentication bypass vulnerability in mod_nss 1.0.8 allows remote attackers to assume the identity of a valid user by using their certificate and entering \u0027password\u0027 as the password.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mod_nss: FakeBasicAuth authentication bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-optional:mod_nss-0:1.0.8-13.el6.i686",
          "6Client-optional:mod_nss-0:1.0.8-13.el6.ppc64",
          "6Client-optional:mod_nss-0:1.0.8-13.el6.s390x",
          "6Client-optional:mod_nss-0:1.0.8-13.el6.src",
          "6Client-optional:mod_nss-0:1.0.8-13.el6.x86_64",
          "6Client-optional:mod_nss-debuginfo-0:1.0.8-13.el6.i686",
          "6Client-optional:mod_nss-debuginfo-0:1.0.8-13.el6.ppc64",
          "6Client-optional:mod_nss-debuginfo-0:1.0.8-13.el6.s390x",
          "6Client-optional:mod_nss-debuginfo-0:1.0.8-13.el6.x86_64",
          "6ComputeNode-optional:mod_nss-0:1.0.8-13.el6.i686",
          "6ComputeNode-optional:mod_nss-0:1.0.8-13.el6.ppc64",
          "6ComputeNode-optional:mod_nss-0:1.0.8-13.el6.s390x",
          "6ComputeNode-optional:mod_nss-0:1.0.8-13.el6.src",
          "6ComputeNode-optional:mod_nss-0:1.0.8-13.el6.x86_64",
          "6ComputeNode-optional:mod_nss-debuginfo-0:1.0.8-13.el6.i686",
          "6ComputeNode-optional:mod_nss-debuginfo-0:1.0.8-13.el6.ppc64",
          "6ComputeNode-optional:mod_nss-debuginfo-0:1.0.8-13.el6.s390x",
          "6ComputeNode-optional:mod_nss-debuginfo-0:1.0.8-13.el6.x86_64",
          "6Server:mod_nss-0:1.0.8-13.el6.i686",
          "6Server:mod_nss-0:1.0.8-13.el6.ppc64",
          "6Server:mod_nss-0:1.0.8-13.el6.s390x",
          "6Server:mod_nss-0:1.0.8-13.el6.src",
          "6Server:mod_nss-0:1.0.8-13.el6.x86_64",
          "6Server:mod_nss-debuginfo-0:1.0.8-13.el6.i686",
          "6Server:mod_nss-debuginfo-0:1.0.8-13.el6.ppc64",
          "6Server:mod_nss-debuginfo-0:1.0.8-13.el6.s390x",
          "6Server:mod_nss-debuginfo-0:1.0.8-13.el6.x86_64",
          "6Workstation:mod_nss-0:1.0.8-13.el6.i686",
          "6Workstation:mod_nss-0:1.0.8-13.el6.ppc64",
          "6Workstation:mod_nss-0:1.0.8-13.el6.s390x",
          "6Workstation:mod_nss-0:1.0.8-13.el6.src",
          "6Workstation:mod_nss-0:1.0.8-13.el6.x86_64",
          "6Workstation:mod_nss-debuginfo-0:1.0.8-13.el6.i686",
          "6Workstation:mod_nss-debuginfo-0:1.0.8-13.el6.ppc64",
          "6Workstation:mod_nss-debuginfo-0:1.0.8-13.el6.s390x",
          "6Workstation:mod_nss-debuginfo-0:1.0.8-13.el6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-4973"
        },
        {
          "category": "external",
          "summary": "RHBZ#1017197",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1017197"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4973",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-4973"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4973",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4973"
        }
      ],
      "release_date": "2011-05-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-12-05T19:50:24+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "6Client-optional:mod_nss-0:1.0.8-13.el6.i686",
            "6Client-optional:mod_nss-0:1.0.8-13.el6.ppc64",
            "6Client-optional:mod_nss-0:1.0.8-13.el6.s390x",
            "6Client-optional:mod_nss-0:1.0.8-13.el6.src",
            "6Client-optional:mod_nss-0:1.0.8-13.el6.x86_64",
            "6Client-optional:mod_nss-debuginfo-0:1.0.8-13.el6.i686",
            "6Client-optional:mod_nss-debuginfo-0:1.0.8-13.el6.ppc64",
            "6Client-optional:mod_nss-debuginfo-0:1.0.8-13.el6.s390x",
            "6Client-optional:mod_nss-debuginfo-0:1.0.8-13.el6.x86_64",
            "6ComputeNode-optional:mod_nss-0:1.0.8-13.el6.i686",
            "6ComputeNode-optional:mod_nss-0:1.0.8-13.el6.ppc64",
            "6ComputeNode-optional:mod_nss-0:1.0.8-13.el6.s390x",
            "6ComputeNode-optional:mod_nss-0:1.0.8-13.el6.src",
            "6ComputeNode-optional:mod_nss-0:1.0.8-13.el6.x86_64",
            "6ComputeNode-optional:mod_nss-debuginfo-0:1.0.8-13.el6.i686",
            "6ComputeNode-optional:mod_nss-debuginfo-0:1.0.8-13.el6.ppc64",
            "6ComputeNode-optional:mod_nss-debuginfo-0:1.0.8-13.el6.s390x",
            "6ComputeNode-optional:mod_nss-debuginfo-0:1.0.8-13.el6.x86_64",
            "6Server:mod_nss-0:1.0.8-13.el6.i686",
            "6Server:mod_nss-0:1.0.8-13.el6.ppc64",
            "6Server:mod_nss-0:1.0.8-13.el6.s390x",
            "6Server:mod_nss-0:1.0.8-13.el6.src",
            "6Server:mod_nss-0:1.0.8-13.el6.x86_64",
            "6Server:mod_nss-debuginfo-0:1.0.8-13.el6.i686",
            "6Server:mod_nss-debuginfo-0:1.0.8-13.el6.ppc64",
            "6Server:mod_nss-debuginfo-0:1.0.8-13.el6.s390x",
            "6Server:mod_nss-debuginfo-0:1.0.8-13.el6.x86_64",
            "6Workstation:mod_nss-0:1.0.8-13.el6.i686",
            "6Workstation:mod_nss-0:1.0.8-13.el6.ppc64",
            "6Workstation:mod_nss-0:1.0.8-13.el6.s390x",
            "6Workstation:mod_nss-0:1.0.8-13.el6.src",
            "6Workstation:mod_nss-0:1.0.8-13.el6.x86_64",
            "6Workstation:mod_nss-debuginfo-0:1.0.8-13.el6.i686",
            "6Workstation:mod_nss-debuginfo-0:1.0.8-13.el6.ppc64",
            "6Workstation:mod_nss-debuginfo-0:1.0.8-13.el6.s390x",
            "6Workstation:mod_nss-debuginfo-0:1.0.8-13.el6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2011:1656"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.0,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "6Client-optional:mod_nss-0:1.0.8-13.el6.i686",
            "6Client-optional:mod_nss-0:1.0.8-13.el6.ppc64",
            "6Client-optional:mod_nss-0:1.0.8-13.el6.s390x",
            "6Client-optional:mod_nss-0:1.0.8-13.el6.src",
            "6Client-optional:mod_nss-0:1.0.8-13.el6.x86_64",
            "6Client-optional:mod_nss-debuginfo-0:1.0.8-13.el6.i686",
            "6Client-optional:mod_nss-debuginfo-0:1.0.8-13.el6.ppc64",
            "6Client-optional:mod_nss-debuginfo-0:1.0.8-13.el6.s390x",
            "6Client-optional:mod_nss-debuginfo-0:1.0.8-13.el6.x86_64",
            "6ComputeNode-optional:mod_nss-0:1.0.8-13.el6.i686",
            "6ComputeNode-optional:mod_nss-0:1.0.8-13.el6.ppc64",
            "6ComputeNode-optional:mod_nss-0:1.0.8-13.el6.s390x",
            "6ComputeNode-optional:mod_nss-0:1.0.8-13.el6.src",
            "6ComputeNode-optional:mod_nss-0:1.0.8-13.el6.x86_64",
            "6ComputeNode-optional:mod_nss-debuginfo-0:1.0.8-13.el6.i686",
            "6ComputeNode-optional:mod_nss-debuginfo-0:1.0.8-13.el6.ppc64",
            "6ComputeNode-optional:mod_nss-debuginfo-0:1.0.8-13.el6.s390x",
            "6ComputeNode-optional:mod_nss-debuginfo-0:1.0.8-13.el6.x86_64",
            "6Server:mod_nss-0:1.0.8-13.el6.i686",
            "6Server:mod_nss-0:1.0.8-13.el6.ppc64",
            "6Server:mod_nss-0:1.0.8-13.el6.s390x",
            "6Server:mod_nss-0:1.0.8-13.el6.src",
            "6Server:mod_nss-0:1.0.8-13.el6.x86_64",
            "6Server:mod_nss-debuginfo-0:1.0.8-13.el6.i686",
            "6Server:mod_nss-debuginfo-0:1.0.8-13.el6.ppc64",
            "6Server:mod_nss-debuginfo-0:1.0.8-13.el6.s390x",
            "6Server:mod_nss-debuginfo-0:1.0.8-13.el6.x86_64",
            "6Workstation:mod_nss-0:1.0.8-13.el6.i686",
            "6Workstation:mod_nss-0:1.0.8-13.el6.ppc64",
            "6Workstation:mod_nss-0:1.0.8-13.el6.s390x",
            "6Workstation:mod_nss-0:1.0.8-13.el6.src",
            "6Workstation:mod_nss-0:1.0.8-13.el6.x86_64",
            "6Workstation:mod_nss-debuginfo-0:1.0.8-13.el6.i686",
            "6Workstation:mod_nss-debuginfo-0:1.0.8-13.el6.ppc64",
            "6Workstation:mod_nss-debuginfo-0:1.0.8-13.el6.s390x",
            "6Workstation:mod_nss-debuginfo-0:1.0.8-13.el6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mod_nss: FakeBasicAuth authentication bypass"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…