Vulnerability Details : CVE-2012-4523
radsecproxy before 1.6.1 does not properly verify certificates when there are configuration blocks with CA settings that are unrelated to the block being used for verifying the certificate chain, which might allow remote attackers to bypass intended access restrictions and spoof clients.
Products affected by CVE-2012-4523
- cpe:2.3:a:uninett:radsecproxy:*:*:*:*:*:*:*:*
- cpe:2.3:a:uninett:radsecproxy:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:uninett:radsecproxy:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:uninett:radsecproxy:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:uninett:radsecproxy:1.1:beta:*:*:*:*:*:*
- cpe:2.3:a:uninett:radsecproxy:1.5:*:*:*:*:*:*:*
- cpe:2.3:a:uninett:radsecproxy:1.3:beta:*:*:*:*:*:*
- cpe:2.3:a:uninett:radsecproxy:1.3:alpha:*:*:*:*:*:*
- cpe:2.3:a:uninett:radsecproxy:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:uninett:radsecproxy:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:uninett:radsecproxy:1.4:*:*:*:*:*:*:*
- cpe:2.3:a:uninett:radsecproxy:1.1:alpha:*:*:*:*:*:*
- cpe:2.3:a:uninett:radsecproxy:1.0:p1:*:*:*:*:*:*
- cpe:2.3:a:uninett:radsecproxy:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:uninett:radsecproxy:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:uninett:radsecproxy:1.0:alpha:*:*:*:*:*:*
- cpe:2.3:a:uninett:radsecproxy:1.0:alpha-p1:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-4523
0.58%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 78 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-4523
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:P/A:N |
10.0
|
4.9
|
NIST |
CWE ids for CVE-2012-4523
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-4523
-
https://postlister.uninett.no/sympa/arc/radsecproxy/2012-09/msg00001.html
radsecproxy - Discussions and support for radsecproxy - arc_protect
-
https://postlister.uninett.no/sympa/arc/radsecproxy/2012-09/msg00006.html
radsecproxy - Discussions and support for radsecproxy - arc_protect
-
http://www.openwall.com/lists/oss-security/2012/10/17/7
oss-security - CVE request: radsecproxy incorrect x.509 certificate validation
-
https://project.nordu.net/browse/RADSECPROXY-43
[RADSECPROXY-43] Radsecproxy is mixing up pre- and post-TLS-handshake client verification - NORDUnet Project
-
http://www.debian.org/security/2012/dsa-2573
Debian -- Security Information -- DSA-2573-1 radsecproxy
-
http://www.securityfocus.com/bid/56105
radsecproxy Client Certificate Verification Security Bypass Vulnerability
-
http://www.openwall.com/lists/oss-security/2012/10/31/6
oss-security - Re: Re: CVE request: radsecproxy incorrect x.509 certificate validation
Jump to