CVE-2011-2701
Gentoo Linux Security Advisory 201311-09
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OCSP is enabled, does not properly parse replies from OCSP responders, which allows remote attackers to bypass authentication by using the EAP-TLS protocol with a revoked X.509 client certificate.
La función ocsp_check de rlm_eap_tls.c de FreeRADIUS 2.1.11, si OCSP está habilitado, no analiza correctamente la sintaxis ("parse") de las respuestas de los agentes transmisores OCSP, lo que permite a atacantes remotos evitar la autenticación usando el protocolo EAP-TLS con un certificado cliente X.509 revocado.
Multiple vulnerabilities have been found in FreeRADIUS, the worst of which allow execution of arbitrary code or Denial of Service. Versions less than 2.2.0 are affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-07-11 CVE Reserved
- 2011-08-04 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-287: Improper Authentication
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
http://securityreason.com/securityalert/8325 | Third Party Advisory | |
http://securitytracker.com/id?1025833 | Vdb Entry | |
http://www.openwall.com/lists/oss-security/2011/07/15/6 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2011/07/18/2 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2011/07/20/9 | Mailing List |
|
http://www.securityfocus.com/archive/1/518974/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/48880 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/68782 | Vdb Entry | |
https://www.dfn-cert.de/informationen/Sicherheitsbulletins/dsb-2011-01.html | X_refsource_misc |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=724815 | 2018-10-09 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/45425 | 2018-10-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Freeradius Search vendor "Freeradius" | Freeradius Search vendor "Freeradius" for product "Freeradius" | 2.1.11 Search vendor "Freeradius" for product "Freeradius" and version "2.1.11" | - |
Affected
|