Korean
<< Back
VID 22243
Severity 30
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The Apache Web server, according to its banner, has a Apache-SSL Client Certificate Forging vulnerability.
Ben Laurie Apache-SSL is a freely available secure Web server based on Apache and SSLeay/OpenSSL. Apache-SSL versions 1.3.28/1.52 and earlier have a default password. If Apache-SSL is configured with SSLVerifyClient set to '1' or '3' (client certificates optional) and SSLFakeBasicAuth, Apache-SSL would permit a client to use real basic authentication to forge a client certificate. A remote attacker could send a certificate with a valid one-line certificate name and use the fixed password ("password" by default) to gain unauthorized access to the affected server.

* Note: This check item for checking safely solely relied on the banner of the remote Apache Web server to assess this vulnerability, so this might be a false positive.

* References:
http://www.securityfocus.com/archive/1/353029
http://www.securiteam.com/unixfocus/5TP022AC0E.html

* Platforms Affected:
Ben Laurie Apache-SSL 1.3.28/1.52 and earlier
Linux Any version
Microsoft Windows Any version
Recommendation Upgrade to the latest version of Apache-SSL (1.3.29/1.53 or later), available from the Apache-SSL Web site at http://www.apache-ssl.org
Related URL CVE-2004-0009 (CVE)
Related URL 9590 (SecurityFocus)
Related URL 15065 (ISS)