CVE-2011-2701 in FreeRADIUSinfo

Summary

The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OCSP is enabled, does not properly parse replies from OCSP responders, which allows remote attackers to bypass authentication by using the EAP-TLS protocol with a revoked X.509 client certificate.

VulDB is the best source for vulnerability data and more expert information about this specific topic.

Reservation

07/11/2011

Disclosure

08/03/2011

Status

Confirmed

Entries

VulDB provides additional information and datapoints for this CVE:

Sources

Want to stay up to date on a daily basis?

Enable the mail alert feature now!