Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-2701

Опубликовано: 04 авг. 2011
Источник: ubuntu
Приоритет: medium
CVSS2: 5.8

Описание

The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OCSP is enabled, does not properly parse replies from OCSP responders, which allows remote attackers to bypass authentication by using the EAP-TLS protocol with a revoked X.509 client certificate.

РелизСтатусПримечание
devel

not-affected

2.1.10+dfsg-3
hardy

ignored

end of life
lucid

not-affected

2.1.8+dfsg-1ubuntu1
maverick

not-affected

2.1.9+dfsg-1ubuntu1
natty

not-affected

2.1.10+dfsg-2ubuntu2
upstream

needs-triage

Показывать по

5.8 Medium

CVSS2

Связанные уязвимости

redhat
больше 14 лет назад

The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OCSP is enabled, does not properly parse replies from OCSP responders, which allows remote attackers to bypass authentication by using the EAP-TLS protocol with a revoked X.509 client certificate.

nvd
больше 14 лет назад

The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OCSP is enabled, does not properly parse replies from OCSP responders, which allows remote attackers to bypass authentication by using the EAP-TLS protocol with a revoked X.509 client certificate.

debian
больше 14 лет назад

The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OC ...

github
больше 3 лет назад

The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OCSP is enabled, does not properly parse replies from OCSP responders, which allows remote attackers to bypass authentication by using the EAP-TLS protocol with a revoked X.509 client certificate.

5.8 Medium

CVSS2