Логотип exploitDog
bind:CVE-2012-4566
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2012-4566

Количество 5

Количество 5

ubuntu логотип

CVE-2012-4566

около 13 лет назад

The DTLS support in radsecproxy before 1.6.2 does not properly verify certificates when there are configuration blocks with CA settings that are unrelated to the block being used for verifying the certificate chain, which might allow remote attackers to bypass intended access restrictions and spoof clients, a different vulnerability than CVE-2012-4523.

CVSS2: 6.4
EPSS: Низкий
nvd логотип

CVE-2012-4566

около 13 лет назад

The DTLS support in radsecproxy before 1.6.2 does not properly verify certificates when there are configuration blocks with CA settings that are unrelated to the block being used for verifying the certificate chain, which might allow remote attackers to bypass intended access restrictions and spoof clients, a different vulnerability than CVE-2012-4523.

CVSS2: 6.4
EPSS: Низкий
debian логотип

CVE-2012-4566

около 13 лет назад

The DTLS support in radsecproxy before 1.6.2 does not properly verify ...

CVSS2: 6.4
EPSS: Низкий
github логотип

GHSA-3qgg-3fwc-j9gv

больше 3 лет назад

The DTLS support in radsecproxy before 1.6.2 does not properly verify certificates when there are configuration blocks with CA settings that are unrelated to the block being used for verifying the certificate chain, which might allow remote attackers to bypass intended access restrictions and spoof clients, a different vulnerability than CVE-2012-4523.

EPSS: Низкий
fstec логотип

BDU:2015-03358

около 13 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации

CVSS2: 6.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2012-4566

The DTLS support in radsecproxy before 1.6.2 does not properly verify certificates when there are configuration blocks with CA settings that are unrelated to the block being used for verifying the certificate chain, which might allow remote attackers to bypass intended access restrictions and spoof clients, a different vulnerability than CVE-2012-4523.

CVSS2: 6.4
0%
Низкий
около 13 лет назад
nvd логотип
CVE-2012-4566

The DTLS support in radsecproxy before 1.6.2 does not properly verify certificates when there are configuration blocks with CA settings that are unrelated to the block being used for verifying the certificate chain, which might allow remote attackers to bypass intended access restrictions and spoof clients, a different vulnerability than CVE-2012-4523.

CVSS2: 6.4
0%
Низкий
около 13 лет назад
debian логотип
CVE-2012-4566

The DTLS support in radsecproxy before 1.6.2 does not properly verify ...

CVSS2: 6.4
0%
Низкий
около 13 лет назад
github логотип
GHSA-3qgg-3fwc-j9gv

The DTLS support in radsecproxy before 1.6.2 does not properly verify certificates when there are configuration blocks with CA settings that are unrelated to the block being used for verifying the certificate chain, which might allow remote attackers to bypass intended access restrictions and spoof clients, a different vulnerability than CVE-2012-4523.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2015-03358

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации

CVSS2: 6.4
около 13 лет назад

Уязвимостей на страницу