In certain configurations, it can be possible to bypass restrictions set by the "SSLCipherSuite" directive of mod_ssl.
Package | www-servers/apache on all architectures |
---|---|
Affected versions | < 2.0.52 |
Unaffected versions | >= 2.0.52 < 2.0 |
Package | net-www/mod_ssl on all architectures |
---|---|
Affected versions | < 2.8.20 |
Unaffected versions | >= 2.8.20 |
The Apache HTTP server is one of the most popular web servers on the internet. mod_ssl provides SSL v2/v3 and TLS v1 support for Apache 1.3 and is also included in Apache 2.
A flaw has been found in mod_ssl where the "SSLCipherSuite" directive could be bypassed in certain configurations if it is used in a directory or location context to restrict the set of allowed cipher suites.
A remote attacker could gain access to a location using any cipher suite allowed by the server/virtual host configuration, disregarding the restrictions by "SSLCipherSuite" for that location.
There is no known workaround at this time.
All Apache 2 users should upgrade to the latest version:
# emerge sync # emerge -pv ">=www-servers/apache-2.0.52" # emerge ">=www-servers/apache-2.0.52"
All mod_ssl users should upgrade to the latest version:
# emerge sync # emerge -pv ">=net-www/mod_ssl-2.8.20" # emerge ">=net-www/mod_ssl-2.8.20"
Release date
October 21, 2004
Latest revision
December 30, 2007: 02
Severity
low
Exploitable
remote
Bugzilla entries