First published: Mon Jul 04 2016(Updated: )
The Apache HTTP Server 2.4.18 through 2.4.20, when mod_http2 and mod_ssl are enabled, does not properly recognize the "SSLVerifyClient require" directive for HTTP/2 request authorization, which allows remote attackers to bypass intended access restrictions by leveraging the ability to send multiple requests over a single connection and aborting a renegotiation.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd | <2.4.23 | 2.4.23 |
Apache Http Server | =2.4.18 | |
Apache Http Server | =2.4.19 | |
Apache Http Server | =2.4.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4979 is considered a moderate severity vulnerability that allows bypass of access restrictions.
To fix CVE-2016-4979, upgrade Apache HTTP Server to version 2.4.23 or later.
CVE-2016-4979 affects Apache HTTP Server versions 2.4.18 through 2.4.20 with mod_http2 and mod_ssl enabled.
CVE-2016-4979 can be exploited by remote attackers to bypass client verification restrictions.
Yes, CVE-2016-4979 is related to SSL/TLS security as it involves the misuse of SSLVerifyClient in HTTP/2 requests.