Revision Date: | 2016-07-06 | Version: | 1 | Title: | CVE-2016-4979 on Ubuntu 16.04 LTS (xenial) - medium. | Description: | The Apache HTTP Server 2.4.18 through 2.4.20, when mod_http2 and mod_ssl are enabled, does not properly recognize the "SSLVerifyClient require" directive for HTTP/2 request authorization, which allows remote attackers to bypass intended access restrictions by leveraging the ability to send multiple requests over a single connection and aborting a renegotiation.
| Family: | unix | Class: | vulnerability | Status: | | Reference(s): | CVE-2016-4979
| Platform(s): | Ubuntu 16.04 LTS
| Product(s): | | Definition Synopsis | Ubuntu 16.04 LTS (xenial) is installed. AND Package Information
NOT apache2 package in xenial, while related to the CVE in some way, is not affected (note: 'no mod_http2 support').
OR NOT apache2-bin package in xenial, while related to the CVE in some way, is not affected (note: 'no mod_http2 support').
OR NOT apache2-data package in xenial, while related to the CVE in some way, is not affected (note: 'no mod_http2 support').
OR NOT apache2-suexec-custom package in xenial, while related to the CVE in some way, is not affected (note: 'no mod_http2 support').
OR NOT apache2-suexec-pristine package in xenial, while related to the CVE in some way, is not affected (note: 'no mod_http2 support').
OR NOT apache2-utils package in xenial, while related to the CVE in some way, is not affected (note: 'no mod_http2 support').
|
|