CVE-2011-4973

NameCVE-2011-4973
DescriptionAuthentication bypass vulnerability in mod_nss 1.0.8 allows remote attackers to assume the identity of a valid user by using their certificate and entering 'password' as the password.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh (attack range: remote)
Debian Bugs729626

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libapache2-mod-nss (PTS)jessie1.0.10-3fixed
sid, stretch1.0.14-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libapache2-mod-nsssource(unstable)1.0.8-4low729626

Notes

[wheezy] - libapache2-mod-nss <no-dsa> (Minor issue)
https://www.redhat.com/archives/mod_nss-list/2011-May/msg00001.html
https://git.fedorahosted.org/cgit/mod_nss.git/commit/?id=a6c3370491ae1d3bc552e8de9353c82f73e510e3
https://bugzilla.redhat.com/show_bug.cgi?id=1017197

Search for package or bug name: Reporting problems