CVE-2011-2701

EUVD-2011-2682
The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OCSP is enabled, does not properly parse replies from OCSP responders, which allows remote attackers to bypass authentication by using the EAP-TLS protocol with a revoked X.509 client certificate.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 63%
Affected Products (NVD)
VendorProductVersion
freeradiusfreeradius
2.1.11
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
freeradius
bookworm
3.2.1+dfsg-4+deb12u1
fixed
bullseye
3.0.21+dfsg-2.2+deb11u1
fixed
sid
3.2.5+dfsg-3
fixed
trixie
3.2.5+dfsg-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
freeradius
hardy
ignored
lucid
not-affected
maverick
not-affected
natty
not-affected