CVE-2012-4566
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The DTLS support in radsecproxy before 1.6.2 does not properly verify certificates when there are configuration blocks with CA settings that are unrelated to the block being used for verifying the certificate chain, which might allow remote attackers to bypass intended access restrictions and spoof clients, a different vulnerability than CVE-2012-4523.
El soporte DTLS en radsecproxy antes de v1.6.2 no verifica correctamente certificados cuando hay bloques de configuración con la configuración de CA que no están relacionados con el bloque que está siendo utilizado para comprobar la cadena de certificados, lo que podría permitir a atacantes remotos evitar las restricciones de acceso previstas y suplantar clientes, una vulnerabilidad diferente a CVE-2012-4523.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2012-08-21 CVE Reserved
- 2012-11-20 CVE Published
- 2024-09-16 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://git.nordu.net/?p=radsecproxy.git%3Ba=commit%3Bh=3682c935facf5ccd7fa600644bbb76957155c680 | X_refsource_confirm | |
http://www.openwall.com/lists/oss-security/2012/10/17/7 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2012/10/31/6 | Mailing List |
|
https://postlister.uninett.no/sympa/arc/radsecproxy/2012-09/msg00001.html | Mailing List | |
https://postlister.uninett.no/sympa/arc/radsecproxy/2012-10/msg00001.html | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/51251 | 2023-11-07 | |
http://www.debian.org/security/2012/dsa-2573 | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Uninett Search vendor "Uninett" | Radsecproxy Search vendor "Uninett" for product "Radsecproxy" | <= 1.6.1 Search vendor "Uninett" for product "Radsecproxy" and version " <= 1.6.1" | - |
Affected
| ||||||
Uninett Search vendor "Uninett" | Radsecproxy Search vendor "Uninett" for product "Radsecproxy" | 1.0 Search vendor "Uninett" for product "Radsecproxy" and version "1.0" | - |
Affected
| ||||||
Uninett Search vendor "Uninett" | Radsecproxy Search vendor "Uninett" for product "Radsecproxy" | 1.0 Search vendor "Uninett" for product "Radsecproxy" and version "1.0" | alpha |
Affected
| ||||||
Uninett Search vendor "Uninett" | Radsecproxy Search vendor "Uninett" for product "Radsecproxy" | 1.0 Search vendor "Uninett" for product "Radsecproxy" and version "1.0" | alpha-p1 |
Affected
| ||||||
Uninett Search vendor "Uninett" | Radsecproxy Search vendor "Uninett" for product "Radsecproxy" | 1.0 Search vendor "Uninett" for product "Radsecproxy" and version "1.0" | p1 |
Affected
| ||||||
Uninett Search vendor "Uninett" | Radsecproxy Search vendor "Uninett" for product "Radsecproxy" | 1.1 Search vendor "Uninett" for product "Radsecproxy" and version "1.1" | - |
Affected
| ||||||
Uninett Search vendor "Uninett" | Radsecproxy Search vendor "Uninett" for product "Radsecproxy" | 1.1 Search vendor "Uninett" for product "Radsecproxy" and version "1.1" | alpha |
Affected
| ||||||
Uninett Search vendor "Uninett" | Radsecproxy Search vendor "Uninett" for product "Radsecproxy" | 1.1 Search vendor "Uninett" for product "Radsecproxy" and version "1.1" | beta |
Affected
| ||||||
Uninett Search vendor "Uninett" | Radsecproxy Search vendor "Uninett" for product "Radsecproxy" | 1.2 Search vendor "Uninett" for product "Radsecproxy" and version "1.2" | - |
Affected
| ||||||
Uninett Search vendor "Uninett" | Radsecproxy Search vendor "Uninett" for product "Radsecproxy" | 1.3 Search vendor "Uninett" for product "Radsecproxy" and version "1.3" | alpha |
Affected
| ||||||
Uninett Search vendor "Uninett" | Radsecproxy Search vendor "Uninett" for product "Radsecproxy" | 1.3 Search vendor "Uninett" for product "Radsecproxy" and version "1.3" | beta |
Affected
| ||||||
Uninett Search vendor "Uninett" | Radsecproxy Search vendor "Uninett" for product "Radsecproxy" | 1.3.1 Search vendor "Uninett" for product "Radsecproxy" and version "1.3.1" | - |
Affected
| ||||||
Uninett Search vendor "Uninett" | Radsecproxy Search vendor "Uninett" for product "Radsecproxy" | 1.4 Search vendor "Uninett" for product "Radsecproxy" and version "1.4" | - |
Affected
| ||||||
Uninett Search vendor "Uninett" | Radsecproxy Search vendor "Uninett" for product "Radsecproxy" | 1.4.1 Search vendor "Uninett" for product "Radsecproxy" and version "1.4.1" | - |
Affected
| ||||||
Uninett Search vendor "Uninett" | Radsecproxy Search vendor "Uninett" for product "Radsecproxy" | 1.4.2 Search vendor "Uninett" for product "Radsecproxy" and version "1.4.2" | - |
Affected
| ||||||
Uninett Search vendor "Uninett" | Radsecproxy Search vendor "Uninett" for product "Radsecproxy" | 1.4.3 Search vendor "Uninett" for product "Radsecproxy" and version "1.4.3" | - |
Affected
| ||||||
Uninett Search vendor "Uninett" | Radsecproxy Search vendor "Uninett" for product "Radsecproxy" | 1.5 Search vendor "Uninett" for product "Radsecproxy" and version "1.5" | - |
Affected
| ||||||
Uninett Search vendor "Uninett" | Radsecproxy Search vendor "Uninett" for product "Radsecproxy" | 1.6 Search vendor "Uninett" for product "Radsecproxy" and version "1.6" | - |
Affected
|