Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3m7r-w3xm-qwcj

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OCSP is enabled, does not properly parse replies from OCSP responders, which allows remote attackers to bypass authentication by using the EAP-TLS protocol with a revoked X.509 client certificate.

The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OCSP is enabled, does not properly parse replies from OCSP responders, which allows remote attackers to bypass authentication by using the EAP-TLS protocol with a revoked X.509 client certificate.

EPSS

Процентиль: 63%
0.00451
Низкий

Дефекты

CWE-287

Связанные уязвимости

ubuntu
больше 14 лет назад

The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OCSP is enabled, does not properly parse replies from OCSP responders, which allows remote attackers to bypass authentication by using the EAP-TLS protocol with a revoked X.509 client certificate.

redhat
больше 14 лет назад

The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OCSP is enabled, does not properly parse replies from OCSP responders, which allows remote attackers to bypass authentication by using the EAP-TLS protocol with a revoked X.509 client certificate.

nvd
больше 14 лет назад

The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OCSP is enabled, does not properly parse replies from OCSP responders, which allows remote attackers to bypass authentication by using the EAP-TLS protocol with a revoked X.509 client certificate.

debian
больше 14 лет назад

The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OC ...

EPSS

Процентиль: 63%
0.00451
Низкий

Дефекты

CWE-287