httpd-bugs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From bugzi...@apache.org
Subject DO NOT REPLY [Bug 50741] New: Detect when the OpenSSL runtime library is vulnerable to CVE-2011-0014
Date Wed, 09 Feb 2011 09:40:31 GMT
https://issues.apache.org/bugzilla/show_bug.cgi?id=50741

           Summary: Detect when the OpenSSL runtime library is vulnerable
                    to CVE-2011-0014
           Product: Apache httpd-2
           Version: 2.3-HEAD
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: normal
          Priority: P2
         Component: mod_ssl
        AssignedTo: bugs@httpd.apache.org
        ReportedBy: rob@comodo.com


http://www.openssl.org/news/secadv_20110208.txt reports that the following
OpenSSL versions are vulnerable:
  - OpenSSL 0.9.8h through 0.9.8q
  - OpenSSL 1.0.0 through 1.0.0c

I propose that mod_ssl should call SSLeay() when httpd starts up.  If a
vulnerable OpenSSL version is detected, a suitable warning should be logged. 
Hopefully this will prompt webmasters to upgrade OpenSSL to a patched version.

With regard to Bug 50740 (Enable OCSP Stapling by default), I suggest that OCSP
Stapling should not be enabled by default when a vulnerable OpenSSL version is
detected.

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org


Mime
View raw message