The Apache HTTP Server 2.4.18 through 2.4.20, when modhttp2 and modssl are enabled, does not properly recognize the "SSLVerifyClient require" directive for HTTP/2 request authorization, which allows remote attackers to bypass intended access restrictions by leveraging the ability to send multiple requests over a single connection and aborting a renegotiation.
[
{
"source": "https://github.com/apache/httpd/commit/2d0e4eff04ea963128a41faaef21f987272e05a2",
"id": "CVE-2016-4979-5eec88a5",
"signature_type": "Function",
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "ssl_hook_Access",
"file": "modules/ssl/ssl_engine_kernel.c"
},
"digest": {
"function_hash": "285512666638282015489581124945252142619",
"length": 13247.0
}
},
{
"source": "https://github.com/apache/httpd/commit/2d0e4eff04ea963128a41faaef21f987272e05a2",
"id": "CVE-2016-4979-f37c52b9",
"signature_type": "Line",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "modules/ssl/ssl_engine_kernel.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"244385919861610858721936967085811442209",
"308071227496002563137936932201529329994",
"158621415921638913253691990362977946518",
"320008290054834887054868414971497180225"
]
}
}
]