MEDIUM · 6.4

CVE-2012-4566

The DTLS support in radsecproxy before 1.6.2 does not properly verify certificates when there are configuration blocks with CA settings that are unrelated to the block being used for verifying the cer...

Vulnerability Description

The DTLS support in radsecproxy before 1.6.2 does not properly verify certificates when there are configuration blocks with CA settings that are unrelated to the block being used for verifying the certificate chain, which might allow remote attackers to bypass intended access restrictions and spoof clients, a different vulnerability than CVE-2012-4523.

CVSS Score

6.4

MEDIUM

AV:N/AC:L/Au:N/C:P/I:P/A:N
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
NONE

Affected Products

VendorProductVersions
UninettRadsecproxy<= 1.6.1

Related Weaknesses (CWE)

References

FAQ

What is CVE-2012-4566?

CVE-2012-4566 is a vulnerability with a CVSS score of 6.4 (MEDIUM). The DTLS support in radsecproxy before 1.6.2 does not properly verify certificates when there are configuration blocks with CA settings that are unrelated to the block being used for verifying the cer...

How severe is CVE-2012-4566?

CVE-2012-4566 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2012-4566?

Check the references section above for vendor advisories and patch information. Affected products include: Uninett Radsecproxy.