6.7 Medium
AI Score
Confidence
Low
6.4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:P/A:N
0.004 Low
EPSS
Percentile
72.4%
The DTLS support in radsecproxy before 1.6.2 does not properly verify certificates when there are configuration blocks with CA settings that are unrelated to the block being used for verifying the certificate chain, which might allow remote attackers to bypass intended access restrictions and spoof clients, a different vulnerability than CVE-2012-4523.
CPE | Name | Operator | Version |
---|---|---|---|
radsecproxy | eq | 1.4 | |
radsecproxy | eq | 1.0 | |
radsecproxy | eq | 1.3 alpha | |
radsecproxy | eq | 1.0 p1 | |
radsecproxy | le | 1.6.1 | |
radsecproxy | eq | 1.3 beta | |
radsecproxy | eq | 1.2 | |
radsecproxy | eq | 1.0 alpha | |
radsecproxy | eq | 1.5 | |
radsecproxy | eq | 1.1 beta |
git.nordu.net/?p=radsecproxy.git;a=commit;h=3682c935facf5ccd7fa600644bbb76957155c680
secunia.com/advisories/51251
www.debian.org/security/2012/dsa-2573
www.openwall.com/lists/oss-security/2012/10/17/7
www.openwall.com/lists/oss-security/2012/10/31/6
postlister.uninett.no/sympa/arc/radsecproxy/2012-09/msg00001.html
postlister.uninett.no/sympa/arc/radsecproxy/2012-10/msg00001.html