CVE-2005-2700

N/A Unknown
Published: September 06, 2005 Modified: April 16, 2026
View on NVD

Description

ssl_engine_kernel.c in mod_ssl before 2.8.24, when using "SSLVerifyClient optional" in the global virtual host configuration, does not properly enforce "SSLVerifyClient require" in a per-location context, which allows remote attackers to bypass intended access restrictions.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://marc.info/?l=apache-modssl&m=112569517603897&w=2
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=112604765028607&w=2
Source: secalert@redhat.com
Issue Tracking Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=112870296926652&w=2
Source: secalert@redhat.com
Issue Tracking Mailing List Third Party Advisory
http://people.apache.org/~jorton/CAN-2005-2700.diff
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/16700
Source: secalert@redhat.com
Not Applicable
http://secunia.com/advisories/16705
Source: secalert@redhat.com
Not Applicable
http://secunia.com/advisories/16714
Source: secalert@redhat.com
Not Applicable
http://secunia.com/advisories/16743
Source: secalert@redhat.com
Not Applicable
http://secunia.com/advisories/16746
Source: secalert@redhat.com
Not Applicable
http://secunia.com/advisories/16748
Source: secalert@redhat.com
Not Applicable
http://secunia.com/advisories/16753
Source: secalert@redhat.com
Not Applicable
http://secunia.com/advisories/16754
Source: secalert@redhat.com
Not Applicable
http://secunia.com/advisories/16769
Source: secalert@redhat.com
Not Applicable
http://secunia.com/advisories/16771
Source: secalert@redhat.com
Not Applicable
http://secunia.com/advisories/16789
Source: secalert@redhat.com
Not Applicable
http://secunia.com/advisories/16864
Source: secalert@redhat.com
Not Applicable
http://secunia.com/advisories/16956
Source: secalert@redhat.com
Not Applicable
http://secunia.com/advisories/17088
Source: secalert@redhat.com
Not Applicable
http://secunia.com/advisories/17288
Source: secalert@redhat.com
Not Applicable
http://secunia.com/advisories/17311
Source: secalert@redhat.com
Not Applicable
http://secunia.com/advisories/17813
Source: secalert@redhat.com
Not Applicable
http://secunia.com/advisories/19072
Source: secalert@redhat.com
Not Applicable
http://secunia.com/advisories/19073
Source: secalert@redhat.com
Not Applicable
http://secunia.com/advisories/21848
Source: secalert@redhat.com
Not Applicable
http://secunia.com/advisories/22523
Source: secalert@redhat.com
Not Applicable
http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm
Source: secalert@redhat.com
Third Party Advisory
http://www.debian.org/security/2005/dsa-805
Source: secalert@redhat.com
Third Party Advisory
http://www.debian.org/security/2005/dsa-807
Source: secalert@redhat.com
Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200509-12.xml
Source: secalert@redhat.com
Third Party Advisory
http://www.kb.cert.org/vuls/id/744929
Source: secalert@redhat.com
Third Party Advisory US Government Resource
http://www.osvdb.org/19188
Source: secalert@redhat.com
Broken Link
http://www.redhat.com/support/errata/RHSA-2005-608.html
Source: secalert@redhat.com
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2005-773.html
Source: secalert@redhat.com
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2005-816.html
Source: secalert@redhat.com
Third Party Advisory
http://www.securityfocus.com/bid/14721
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-177-1
Source: secalert@redhat.com
Third Party Advisory
http://www.vupen.com/english/advisories/2005/1625
Source: secalert@redhat.com
Permissions Required
http://www.vupen.com/english/advisories/2005/2659
Source: secalert@redhat.com
Permissions Required
http://www.vupen.com/english/advisories/2006/0789
Source: secalert@redhat.com
Permissions Required
http://www.vupen.com/english/advisories/2006/4207
Source: secalert@redhat.com
Permissions Required
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=167195
Source: secalert@redhat.com
Issue Tracking Third Party Advisory
https://lists.opensuse.org/opensuse-security-announce/2006-09/msg00016.html
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://marc.info/?l=apache-modssl&m=112569517603897&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=112604765028607&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=112870296926652&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Mailing List Third Party Advisory
http://people.apache.org/~jorton/CAN-2005-2700.diff
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/16700
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/16705
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/16714
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/16743
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/16746
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/16748
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/16753
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/16754
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/16769
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/16771
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/16789
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/16864
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/16956
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/17088
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/17288
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/17311
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/17813
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/19072
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/19073
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/21848
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/22523
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102197-1
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102198-1
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2005/dsa-805
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2005/dsa-807
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200509-12.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.kb.cert.org/vuls/id/744929
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2005:161
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.novell.com/linux/security/advisories/2005_51_apache2.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.novell.com/linux/security/advisories/2005_52_apache2.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.osvdb.org/19188
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2005-608.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2005-773.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2005-816.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/bid/14721
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-177-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.vupen.com/english/advisories/2005/1625
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required
http://www.vupen.com/english/advisories/2005/2659
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required
http://www.vupen.com/english/advisories/2006/0789
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required
http://www.vupen.com/english/advisories/2006/4207
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3117
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=167195
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Third Party Advisory
https://lists.opensuse.org/opensuse-security-announce/2006-09/msg00016.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10416
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

128 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
15.1%
95th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

debian canonical apache