mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to bypass intended access restrictions.
{ "binaries": [ { "binary_version": "1.0.12-2", "binary_name": "libapache2-mod-nss" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2013/UBUNTU-CVE-2013-4566.json"
{ "binaries": [ { "binary_version": "1.0.14-1build1", "binary_name": "libapache2-mod-nss" } ] }