Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2011-2701

Опубликовано: 04 авг. 2011
Источник: nvd
CVSS2: 5.8
EPSS Низкий

Описание

The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OCSP is enabled, does not properly parse replies from OCSP responders, which allows remote attackers to bypass authentication by using the EAP-TLS protocol with a revoked X.509 client certificate.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:freeradius:freeradius:2.1.11:*:*:*:*:*:*:*

EPSS

Процентиль: 63%
0.00451
Низкий

5.8 Medium

CVSS2

Дефекты

CWE-287

Связанные уязвимости

ubuntu
больше 14 лет назад

The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OCSP is enabled, does not properly parse replies from OCSP responders, which allows remote attackers to bypass authentication by using the EAP-TLS protocol with a revoked X.509 client certificate.

redhat
больше 14 лет назад

The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OCSP is enabled, does not properly parse replies from OCSP responders, which allows remote attackers to bypass authentication by using the EAP-TLS protocol with a revoked X.509 client certificate.

debian
больше 14 лет назад

The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OC ...

github
больше 3 лет назад

The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OCSP is enabled, does not properly parse replies from OCSP responders, which allows remote attackers to bypass authentication by using the EAP-TLS protocol with a revoked X.509 client certificate.

EPSS

Процентиль: 63%
0.00451
Низкий

5.8 Medium

CVSS2

Дефекты

CWE-287