RHEL 2.1 : mod_ssl (RHSA-2005:773)

Critical Nessus Plugin ID 19714


The remote Red Hat host is missing a security update.


An updated mod_ssl package for Apache that corrects a security issue is now available.

This update has been rated as having important security impact by the Red Hat Security Response Team.

The mod_ssl module provides strong cryptography for the Apache Web server via the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols.

A flaw was discovered in mod_ssl's handling of the 'SSLVerifyClient' directive. This flaw occurs if a virtual host is configured using 'SSLVerifyClient optional' and a directive 'SSLVerifyClient required' is set for a specific location. For servers configured in this fashion, an attacker may be able to access resources that should otherwise be protected, by not supplying a client certificate when connecting. The Common Vulnerabilities and Exposures project assigned the name CVE-2005-2700 to this issue.

Users of mod_ssl should upgrade to this updated package, which contains a backported patch to correct this issue.


Update the affected mod_ssl package.

See Also



Plugin Details

Severity: Critical

ID: 19714

File Name: redhat-RHSA-2005-773.nasl

Version: $Revision: 1.17 $

Type: local

Agent: unix

Published: 2005/09/17

Modified: 2016/12/28

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:mod_ssl, cpe:/o:redhat:enterprise_linux:2.1

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 2005/09/15

Reference Information

CVE: CVE-2005-2700

RHSA: 2005:773