CVE-2012-4523
Summary
| CVE | CVE-2012-4523 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2012-11-20 00:55:01 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | radsecproxy before 1.6.1 does not properly verify certificates when there are configuration blocks with CA settings that are unrelated to the block being used for verifying the certificate chain, which might allow remote attackers to bypass intended access restrictions and spoof clients. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
PartialIntegrity
PartialAvailability
NoneAV:N/AC:L/Au:N/C:P/I:P/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Uninett | Radsecproxy | 1.0 | All | All | All |
| Application | Uninett | Radsecproxy | 1.0 | alpha | All | All |
| Application | Uninett | Radsecproxy | 1.0 | alpha-p1 | All | All |
| Application | Uninett | Radsecproxy | 1.0 | p1 | All | All |
| Application | Uninett | Radsecproxy | 1.1 | All | All | All |
| Application | Uninett | Radsecproxy | 1.1 | alpha | All | All |
| Application | Uninett | Radsecproxy | 1.1 | beta | All | All |
| Application | Uninett | Radsecproxy | 1.2 | All | All | All |
| Application | Uninett | Radsecproxy | 1.3 | alpha | All | All |
| Application | Uninett | Radsecproxy | 1.3 | beta | All | All |
| Application | Uninett | Radsecproxy | 1.3.1 | All | All | All |
| Application | Uninett | Radsecproxy | 1.4 | All | All | All |
| Application | Uninett | Radsecproxy | 1.4.1 | All | All | All |
| Application | Uninett | Radsecproxy | 1.4.2 | All | All | All |
| Application | Uninett | Radsecproxy | 1.4.3 | All | All | All |
| Application | Uninett | Radsecproxy | 1.5 | All | All | All |
| Application | Uninett | Radsecproxy | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [RADSECPROXY-43] Radsecproxy is mixing up pre- and post-TLS-handshake client verification - NORDUnet Project | af854a3a-2127-422b-91ae-364da2661108 | project.nordu.net | |
| radsecproxy - Discussions and support for radsecproxy - arc_protect | af854a3a-2127-422b-91ae-364da2661108 | postlister.uninett.no | |
| oss-security - Re: Re: CVE request: radsecproxy incorrect x.509 certificate validation | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | |
| oss-security - CVE request: radsecproxy incorrect x.509 certificate validation | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | |
| Security Advisory SA51251 - Debian update for radsecproxy - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| radsecproxy Client Certificate Verification Security Bypass Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| radsecproxy - Discussions and support for radsecproxy - arc_protect | af854a3a-2127-422b-91ae-364da2661108 | postlister.uninett.no | |
| Debian -- Security Information -- DSA-2573-1 radsecproxy | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.