The Apache HTTP Server 2.4.18 through 2.4.20, when modhttp2 and modssl are enabled, does not properly recognize the "SSLVerifyClient require" directive for HTTP/2 request authorization, which allows remote attackers to bypass intended access restrictions by leveraging the ability to send multiple requests over a single connection and aborting a renegotiation.
{ "vanir_signatures": [ { "target": { "function": "ssl_hook_Access", "file": "modules/ssl/ssl_engine_kernel.c" }, "signature_type": "Function", "id": "CVE-2016-4979-5eec88a5", "deprecated": false, "signature_version": "v1", "source": "https://github.com/apache/httpd/commit/2d0e4eff04ea963128a41faaef21f987272e05a2", "digest": { "function_hash": "285512666638282015489581124945252142619", "length": 13247.0 } }, { "target": { "file": "modules/ssl/ssl_engine_kernel.c" }, "signature_type": "Line", "id": "CVE-2016-4979-f37c52b9", "deprecated": false, "signature_version": "v1", "source": "https://github.com/apache/httpd/commit/2d0e4eff04ea963128a41faaef21f987272e05a2", "digest": { "line_hashes": [ "244385919861610858721936967085811442209", "308071227496002563137936932201529329994", "158621415921638913253691990362977946518", "320008290054834887054868414971497180225" ], "threshold": 0.9 } } ] }