CVE-2012-4523
Summary
| CVE | CVE-2012-4523 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2012-11-20 00:55:00 UTC |
| Updated | 2013-01-30 04:55:00 UTC |
| Description | radsecproxy before 1.6.1 does not properly verify certificates when there are configuration blocks with CA settings that are unrelated to the block being used for verifying the certificate chain, which might allow remote attackers to bypass intended access restrictions and spoof clients. |
Risk And Classification
Problem Types: CWE-264
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Uninett | Radsecproxy | 1.0 | All | All | All |
| Application | Uninett | Radsecproxy | 1.0 | alpha | All | All |
| Application | Uninett | Radsecproxy | 1.0 | alpha-p1 | All | All |
| Application | Uninett | Radsecproxy | 1.0 | p1 | All | All |
| Application | Uninett | Radsecproxy | 1.1 | All | All | All |
| Application | Uninett | Radsecproxy | 1.1 | alpha | All | All |
| Application | Uninett | Radsecproxy | 1.1 | beta | All | All |
| Application | Uninett | Radsecproxy | 1.2 | All | All | All |
| Application | Uninett | Radsecproxy | 1.3 | alpha | All | All |
| Application | Uninett | Radsecproxy | 1.3 | beta | All | All |
| Application | Uninett | Radsecproxy | 1.3.1 | All | All | All |
| Application | Uninett | Radsecproxy | 1.4 | All | All | All |
| Application | Uninett | Radsecproxy | 1.4.1 | All | All | All |
| Application | Uninett | Radsecproxy | 1.4.2 | All | All | All |
| Application | Uninett | Radsecproxy | 1.4.3 | All | All | All |
| Application | Uninett | Radsecproxy | 1.5 | All | All | All |
| Application | Uninett | Radsecproxy | 1.0 | All | All | All |
| Application | Uninett | Radsecproxy | 1.0 | alpha | All | All |
| Application | Uninett | Radsecproxy | 1.0 | alpha-p1 | All | All |
| Application | Uninett | Radsecproxy | 1.0 | p1 | All | All |
| Application | Uninett | Radsecproxy | 1.1 | All | All | All |
| Application | Uninett | Radsecproxy | 1.1 | alpha | All | All |
| Application | Uninett | Radsecproxy | 1.1 | beta | All | All |
| Application | Uninett | Radsecproxy | 1.2 | All | All | All |
| Application | Uninett | Radsecproxy | 1.3 | alpha | All | All |
| Application | Uninett | Radsecproxy | 1.3 | beta | All | All |
| Application | Uninett | Radsecproxy | 1.3.1 | All | All | All |
| Application | Uninett | Radsecproxy | 1.4 | All | All | All |
| Application | Uninett | Radsecproxy | 1.4.1 | All | All | All |
| Application | Uninett | Radsecproxy | 1.4.2 | All | All | All |
| Application | Uninett | Radsecproxy | 1.4.3 | All | All | All |
| Application | Uninett | Radsecproxy | 1.5 | All | All | All |
| Application | Uninett | Radsecproxy | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| radsecproxy - Discussions and support for radsecproxy - arc_protect | MLIST | postlister.uninett.no | |
| Debian -- Security Information -- DSA-2573-1 radsecproxy | DEBIAN | www.debian.org | |
| Security Advisory SA51251 - Debian update for radsecproxy - Secunia | SECUNIA | secunia.com | Vendor Advisory |
| oss-security - CVE request: radsecproxy incorrect x.509 certificate validation | MLIST | www.openwall.com | |
| radsecproxy Client Certificate Verification Security Bypass Vulnerability | BID | www.securityfocus.com | |
| [RADSECPROXY-43] Radsecproxy is mixing up pre- and post-TLS-handshake client verification - NORDUnet Project | CONFIRM | project.nordu.net | |
| radsecproxy - Discussions and support for radsecproxy - arc_protect | MLIST | postlister.uninett.no | |
| oss-security - Re: Re: CVE request: radsecproxy incorrect x.509 certificate validation | MLIST | www.openwall.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.