CVE-2013-4566

Severity

40%

Complexity

49%

Confidentiality

81%

mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to bypass intended access restrictions.

mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to bypass intended access restrictions.

CVSS 2.0 Base Score 4. CVSS Attack Vector: network. CVSS Attack Complexity: high. CVSS Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:N).

Overview

First reported 11 years ago

2013-12-12 18:55:00

Last updated 5 years ago

2019-04-22 17:48:00

Affected Software

mod_nss project mod_nss 1.0

1.0

mod_nss project mod_nss 1.0.2

1.0.2

mod_nss project mod_nss 1.0.3

1.0.3

mod_nss project mod_nss 1.0.4

1.0.4

mod_nss project mod_nss 1.0.5

1.0.5

mod_nss project mod_nss 1.0.6

1.0.6

mod_nss project mod_nss 1.0.7

1.0.7

Red Hat Enterprise Linux 5

5

Red Hat Enterprise Linux 6.0

6.0

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.