CVE-2012-4566

EUVD-2012-4494
The DTLS support in radsecproxy before 1.6.2 does not properly verify certificates when there are configuration blocks with CA settings that are unrelated to the block being used for verifying the certificate chain, which might allow remote attackers to bypass intended access restrictions and spoof clients, a different vulnerability than CVE-2012-4523.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.4 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 38%
Affected Products (NVD)
VendorProductVersion
uninettradsecproxy
𝑥
≤ 1.6.1
uninettradsecproxy
1.0
uninettradsecproxy
1.0:alpha
uninettradsecproxy
1.0:alpha-p1
uninettradsecproxy
1.0:p1
uninettradsecproxy
1.1
uninettradsecproxy
1.1:alpha
uninettradsecproxy
1.1:beta
uninettradsecproxy
1.2
uninettradsecproxy
1.3:alpha
uninettradsecproxy
1.3:beta
uninettradsecproxy
1.3.1
uninettradsecproxy
1.4
uninettradsecproxy
1.4.1
uninettradsecproxy
1.4.2
uninettradsecproxy
1.4.3
uninettradsecproxy
1.5
uninettradsecproxy
1.6
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
radsecproxy
bookworm
1.9.2-2
fixed
bullseye
1.8.2-4
fixed
sid
1.11.0-1
fixed
trixie
1.11.0-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
radsecproxy
hardy
dne
lucid
ignored
oneiric
ignored
precise
ignored
quantal
ignored
raring
not-affected
saucy
not-affected
trusty
dne
utopic
not-affected
vivid
not-affected
wily
not-affected
xenial
not-affected
yakkety
not-affected
zesty
not-affected
Common Weakness Enumeration