6.4

CVE-2012-4523

radsecproxy before 1.6.1 does not properly verify certificates when there are configuration blocks with CA settings that are unrelated to the block being used for verifying the certificate chain, which might allow remote attackers to bypass intended access restrictions and spoof clients.

Data is provided by the National Vulnerability Database (NVD)
UninettRadsecproxy Version <= 1.6
UninettRadsecproxy Version1.0
UninettRadsecproxy Version1.0 Updatealpha
UninettRadsecproxy Version1.0 Updatealpha-p1
UninettRadsecproxy Version1.0 Updatep1
UninettRadsecproxy Version1.1
UninettRadsecproxy Version1.1 Updatealpha
UninettRadsecproxy Version1.1 Updatebeta
UninettRadsecproxy Version1.2
UninettRadsecproxy Version1.3 Updatealpha
UninettRadsecproxy Version1.3 Updatebeta
UninettRadsecproxy Version1.3.1
UninettRadsecproxy Version1.4
UninettRadsecproxy Version1.4.1
UninettRadsecproxy Version1.4.2
UninettRadsecproxy Version1.4.3
UninettRadsecproxy Version1.5
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.19% 0.371
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.4 10 4.9
AV:N/AC:L/Au:N/C:P/I:P/A:N