Описание
The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OCSP is enabled, does not properly parse replies from OCSP responders, which allows remote attackers to bypass authentication by using the EAP-TLS protocol with a revoked X.509 client certificate.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 2.1.10+dfsg-3 |
| hardy | ignored | end of life |
| lucid | not-affected | 2.1.8+dfsg-1ubuntu1 |
| maverick | not-affected | 2.1.9+dfsg-1ubuntu1 |
| natty | not-affected | 2.1.10+dfsg-2ubuntu2 |
| upstream | needs-triage |
Показывать по
5.8 Medium
CVSS2
Связанные уязвимости
The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OCSP is enabled, does not properly parse replies from OCSP responders, which allows remote attackers to bypass authentication by using the EAP-TLS protocol with a revoked X.509 client certificate.
The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OCSP is enabled, does not properly parse replies from OCSP responders, which allows remote attackers to bypass authentication by using the EAP-TLS protocol with a revoked X.509 client certificate.
The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OC ...
The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OCSP is enabled, does not properly parse replies from OCSP responders, which allows remote attackers to bypass authentication by using the EAP-TLS protocol with a revoked X.509 client certificate.
5.8 Medium
CVSS2