First published: Sat Oct 16 2004(Updated: )
The mod_ssl module in Apache 2.0.35 through 2.0.52, when using the "SSLCipherSuite" directive in directory or location context, allows remote clients to bypass intended restrictions by using any cipher suite that is allowed by the virtual host configuration.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Http Server | =2.0.42 | |
Apache Http Server | =2.0.47 | |
Apache Http Server | =2.0.50 | |
Apache Http Server | =2.0.35 | |
Apache Http Server | =2.0.37 | |
Apache Http Server | =2.0.44 | |
Apache Http Server | =2.0.39 | |
Apache Http Server | =2.0.52 | |
Apache Http Server | =2.0.51 | |
Apache Http Server | =2.0.41 | |
Apache Http Server | =2.0.49 | |
Apache Http Server | =2.0.38 | |
Apache Http Server | =2.0.48 | |
Apache Http Server | =2.0.45 | |
Apache Http Server | =2.0.40 | |
Apache Http Server | =2.0.36 | |
Apache Http Server | =2.0.46 | |
Apache Http Server | =2.0.43 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0885 has a medium severity rating, allowing remote clients to bypass SSL cipher restrictions.
To fix CVE-2004-0885, update Apache HTTP Server to a version later than 2.0.52.
Versions of Apache HTTP Server ranging from 2.0.35 to 2.0.52 are affected by CVE-2004-0885.
Yes, CVE-2004-0885 allows remote exploitation due to improper handling of the SSLCipherSuite directive.
CVE-2004-0885 can potentially weaken the security of SSL connections by enabling unauthorized cipher suite usage.