Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-4523

Опубликовано: 20 нояб. 2012
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.4

Описание

radsecproxy before 1.6.1 does not properly verify certificates when there are configuration blocks with CA settings that are unrelated to the block being used for verifying the certificate chain, which might allow remote attackers to bypass intended access restrictions and spoof clients.

РелизСтатусПримечание
devel

not-affected

1.6.2-1
esm-apps/xenial

not-affected

1.6.2-1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [1.6.2-1]]
hardy

DNE

lucid

ignored

end of life
natty

ignored

end of life
oneiric

ignored

end of life
precise

ignored

end of life
precise/esm

DNE

precise was needed
quantal

ignored

end of life

Показывать по

EPSS

Процентиль: 40%
0.00185
Низкий

6.4 Medium

CVSS2

Связанные уязвимости

nvd
около 13 лет назад

radsecproxy before 1.6.1 does not properly verify certificates when there are configuration blocks with CA settings that are unrelated to the block being used for verifying the certificate chain, which might allow remote attackers to bypass intended access restrictions and spoof clients.

debian
около 13 лет назад

radsecproxy before 1.6.1 does not properly verify certificates when th ...

github
больше 3 лет назад

radsecproxy before 1.6.1 does not properly verify certificates when there are configuration blocks with CA settings that are unrelated to the block being used for verifying the certificate chain, which might allow remote attackers to bypass intended access restrictions and spoof clients.

fstec
около 13 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации

EPSS

Процентиль: 40%
0.00185
Низкий

6.4 Medium

CVSS2