Vulnerabilities > CVE-2015-2091 - Cryptographic Issues vulnerability in Apache Mod-Gnutls

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
low complexity
apache
CWE-310
nessus

Summary

The authentication hook (mgs_hook_authz) in mod-gnutls 0.5.10 and earlier does not validate client certificates when "GnuTLSClientVerify require" is set, which allows remote attackers to spoof clients via a crafted certificate.

Vulnerable Configurations

Part Description Count
Application
Apache
1

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Nessus

  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-3177.NASL
    descriptionThomas Klute discovered that in mod-gnutls, an Apache module providing SSL and TLS encryption with GnuTLS, a bug caused the server
    last seen2020-03-17
    modified2015-03-11
    plugin id81747
    published2015-03-11
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/81747
    titleDebian DSA-3177-1 : mod-gnutls - security update
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201709-04.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201709-04 (mod_gnutls: Certificate validation error) It was discovered that the authentication hook in mod_gnutls does not validate client’s certificates even when option “GnuTLSClientVerify” is set to “require”. Impact : A remote attacker could present a crafted certificate and spoof clients data. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id103272
    published2017-09-18
    reporterThis script is Copyright (C) 2017 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/103272
    titleGLSA-201709-04 : mod_gnutls: Certificate validation error
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-170.NASL
    descriptionThomas Klute discovered that in mod-gnutls, an Apache module providing SSL and TLS encryption with GnuTLS, a bug caused the server
    last seen2020-03-17
    modified2015-03-26
    plugin id82155
    published2015-03-26
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/82155
    titleDebian DLA-170-1 : mod-gnutls security update