7.5
CVSSv2

CVE-2004-0885

Published: 03/11/2004 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The mod_ssl module in Apache 2.0.35 up to and including 2.0.52, when using the "SSLCipherSuite" directive in directory or location context, allows remote clients to bypass intended restrictions by using any cipher suite that is allowed by the virtual host configuration.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache http server 2.0.42

apache http server 2.0.47

apache http server 2.0.50

apache http server 2.0.35

apache http server 2.0.37

apache http server 2.0.44

apache http server 2.0.39

apache http server 2.0.52

apache http server 2.0.51

apache http server 2.0.41

apache http server 2.0.49

apache http server 2.0.38

apache http server 2.0.48

apache http server 2.0.45

apache http server 2.0.40

apache http server 2.0.36

apache http server 2.0.46

apache http server 2.0.43

Vendor Advisories

Synopsis httpd security update Type/Severity Security Advisory: Important Topic Updated httpd packages that include fixes for two security issues, as well asother bugs, are now available Description The Apache HTTP server is a powerful, full-featured, efficient, andfreely-available Web ser ...
Synopsis apache, mod_ssl security update Type/Severity Security Advisory: Moderate Topic Updated apache and mod_ssl packages that fix various minor security issuesand bugs in the Apache Web server are now available for Red Hat EnterpriseLinux 21 Description The Apache HTTP Server is a pow ...

References

NVD-CWE-Otherhttp://www.redhat.com/support/errata/RHSA-2004-600.htmlhttp://www.apacheweek.com/features/security-20http://issues.apache.org/bugzilla/show_bug.cgi?id=31505http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX01123http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.htmlhttp://www.ubuntu.com/usn/usn-177-1http://sunsolve.sun.com/search/document.do?assetkey=1-26-102198-1http://secunia.com/advisories/19072http://www.redhat.com/support/errata/RHSA-2004-562.htmlhttp://www.redhat.com/support/errata/RHSA-2005-816.htmlhttp://www.securityfocus.com/bid/11360http://support.avaya.com/elmodocs2/security/ASA-2006-081.htmhttp://lists.apple.com/archives/security-announce/2005/Aug/msg00000.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0261.htmlhttp://www.vupen.com/english/advisories/2006/0789http://marc.info/?l=bugtraq&m=109786159119069&w=2https://exchange.xforce.ibmcloud.com/vulnerabilities/17671https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10384https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3Ehttps://access.redhat.com/errata/RHSA-2004:562https://nvd.nist.gov