Apache 2, mod_ssl: Bypass of SSLCipherSuite directive — GLSA 200410-21

In certain configurations, it can be possible to bypass restrictions set by the "SSLCipherSuite" directive of mod_ssl.

Affected packages

www-servers/apache on all architectures
Affected versions < 2.0.52
Unaffected versions >= 2.0.52
< 2.0
net-www/mod_ssl on all architectures
Affected versions < 2.8.20
Unaffected versions >= 2.8.20

Background

The Apache HTTP server is one of the most popular web servers on the internet. mod_ssl provides SSL v2/v3 and TLS v1 support for Apache 1.3 and is also included in Apache 2.

Description

A flaw has been found in mod_ssl where the "SSLCipherSuite" directive could be bypassed in certain configurations if it is used in a directory or location context to restrict the set of allowed cipher suites.

Impact

A remote attacker could gain access to a location using any cipher suite allowed by the server/virtual host configuration, disregarding the restrictions by "SSLCipherSuite" for that location.

Workaround

There is no known workaround at this time.

Resolution

All Apache 2 users should upgrade to the latest version:

 # emerge sync

 # emerge -pv ">=www-servers/apache-2.0.52"
 # emerge ">=www-servers/apache-2.0.52"

All mod_ssl users should upgrade to the latest version:

 # emerge sync

 # emerge -pv ">=net-www/mod_ssl-2.8.20"
 # emerge ">=net-www/mod_ssl-2.8.20"

References

Release date
October 21, 2004

Latest revision
December 30, 2007: 02

Severity
low

Exploitable
remote

Bugzilla entries