CVE-2012-4566
Summary
| CVE | CVE-2012-4566 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2012-11-20 00:55:00 UTC |
| Updated | 2023-11-07 02:11:00 UTC |
| Description | The DTLS support in radsecproxy before 1.6.2 does not properly verify certificates when there are configuration blocks with CA settings that are unrelated to the block being used for verifying the certificate chain, which might allow remote attackers to bypass intended access restrictions and spoof clients, a different vulnerability than CVE-2012-4523. |
Risk And Classification
Problem Types: CWE-264
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Uninett | Radsecproxy | 1.0 | All | All | All |
| Application | Uninett | Radsecproxy | 1.0 | alpha | All | All |
| Application | Uninett | Radsecproxy | 1.0 | alpha-p1 | All | All |
| Application | Uninett | Radsecproxy | 1.0 | p1 | All | All |
| Application | Uninett | Radsecproxy | 1.1 | All | All | All |
| Application | Uninett | Radsecproxy | 1.1 | alpha | All | All |
| Application | Uninett | Radsecproxy | 1.1 | beta | All | All |
| Application | Uninett | Radsecproxy | 1.2 | All | All | All |
| Application | Uninett | Radsecproxy | 1.3 | alpha | All | All |
| Application | Uninett | Radsecproxy | 1.3 | beta | All | All |
| Application | Uninett | Radsecproxy | 1.3.1 | All | All | All |
| Application | Uninett | Radsecproxy | 1.4 | All | All | All |
| Application | Uninett | Radsecproxy | 1.4.1 | All | All | All |
| Application | Uninett | Radsecproxy | 1.4.2 | All | All | All |
| Application | Uninett | Radsecproxy | 1.4.3 | All | All | All |
| Application | Uninett | Radsecproxy | 1.5 | All | All | All |
| Application | Uninett | Radsecproxy | 1.6 | All | All | All |
| Application | Uninett | Radsecproxy | 1.0 | All | All | All |
| Application | Uninett | Radsecproxy | 1.0 | alpha | All | All |
| Application | Uninett | Radsecproxy | 1.0 | alpha-p1 | All | All |
| Application | Uninett | Radsecproxy | 1.0 | p1 | All | All |
| Application | Uninett | Radsecproxy | 1.1 | All | All | All |
| Application | Uninett | Radsecproxy | 1.1 | alpha | All | All |
| Application | Uninett | Radsecproxy | 1.1 | beta | All | All |
| Application | Uninett | Radsecproxy | 1.2 | All | All | All |
| Application | Uninett | Radsecproxy | 1.3 | alpha | All | All |
| Application | Uninett | Radsecproxy | 1.3 | beta | All | All |
| Application | Uninett | Radsecproxy | 1.3.1 | All | All | All |
| Application | Uninett | Radsecproxy | 1.4 | All | All | All |
| Application | Uninett | Radsecproxy | 1.4.1 | All | All | All |
| Application | Uninett | Radsecproxy | 1.4.2 | All | All | All |
| Application | Uninett | Radsecproxy | 1.4.3 | All | All | All |
| Application | Uninett | Radsecproxy | 1.5 | All | All | All |
| Application | Uninett | Radsecproxy | 1.6 | All | All | All |
| Application | Uninett | Radsecproxy | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| radsecproxy - Discussions and support for radsecproxy - arc_protect | MLIST | postlister.uninett.no | |
| Debian -- Security Information -- DSA-2573-1 radsecproxy | DEBIAN | www.debian.org | |
| Security Advisory SA51251 - Debian update for radsecproxy - Secunia | SECUNIA | secunia.com | Vendor Advisory |
| oss-security - CVE request: radsecproxy incorrect x.509 certificate validation | MLIST | www.openwall.com | |
| Sign in · GitLab | CONFIRM | git.nordu.net | |
| radsecproxy - Discussions and support for radsecproxy - arc_protect | MLIST | postlister.uninett.no | |
| oss-security - Re: Re: CVE request: radsecproxy incorrect x.509 certificate validation | MLIST | www.openwall.com | |
| Sign in · GitLab | git.nordu.net | ||
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.