CVE-2012-4566
Summary
| CVE | CVE-2012-4566 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2012-11-20 00:55:01 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | The DTLS support in radsecproxy before 1.6.2 does not properly verify certificates when there are configuration blocks with CA settings that are unrelated to the block being used for verifying the certificate chain, which might allow remote attackers to bypass intended access restrictions and spoof clients, a different vulnerability than CVE-2012-4523. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
PartialIntegrity
PartialAvailability
NoneAV:N/AC:L/Au:N/C:P/I:P/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Uninett | Radsecproxy | 1.0 | All | All | All |
| Application | Uninett | Radsecproxy | 1.0 | alpha | All | All |
| Application | Uninett | Radsecproxy | 1.0 | alpha-p1 | All | All |
| Application | Uninett | Radsecproxy | 1.0 | p1 | All | All |
| Application | Uninett | Radsecproxy | 1.1 | All | All | All |
| Application | Uninett | Radsecproxy | 1.1 | alpha | All | All |
| Application | Uninett | Radsecproxy | 1.1 | beta | All | All |
| Application | Uninett | Radsecproxy | 1.2 | All | All | All |
| Application | Uninett | Radsecproxy | 1.3 | alpha | All | All |
| Application | Uninett | Radsecproxy | 1.3 | beta | All | All |
| Application | Uninett | Radsecproxy | 1.3.1 | All | All | All |
| Application | Uninett | Radsecproxy | 1.4 | All | All | All |
| Application | Uninett | Radsecproxy | 1.4.1 | All | All | All |
| Application | Uninett | Radsecproxy | 1.4.2 | All | All | All |
| Application | Uninett | Radsecproxy | 1.4.3 | All | All | All |
| Application | Uninett | Radsecproxy | 1.5 | All | All | All |
| Application | Uninett | Radsecproxy | 1.6 | All | All | All |
| Application | Uninett | Radsecproxy | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Sign in · GitLab | af854a3a-2127-422b-91ae-364da2661108 | git.nordu.net | |
| radsecproxy - Discussions and support for radsecproxy - arc_protect | af854a3a-2127-422b-91ae-364da2661108 | postlister.uninett.no | |
| oss-security - Re: Re: CVE request: radsecproxy incorrect x.509 certificate validation | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | |
| oss-security - CVE request: radsecproxy incorrect x.509 certificate validation | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | |
| radsecproxy - Discussions and support for radsecproxy - arc_protect | af854a3a-2127-422b-91ae-364da2661108 | postlister.uninett.no | |
| Security Advisory SA51251 - Debian update for radsecproxy - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Debian -- Security Information -- DSA-2573-1 radsecproxy | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| Sign in · GitLab | MITRE | git.nordu.net | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.