CVE-2011-2701 in FreeRADIUSinfo

Zusammenfassung (Englisch)

The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OCSP is enabled, does not properly parse replies from OCSP responders, which allows remote attackers to bypass authentication by using the EAP-TLS protocol with a revoked X.509 client certificate.

VulDB is the best source for vulnerability data and more expert information about this specific topic.

Reservieren

11.07.2011

Veröffentlichung

03.08.2011

Status

Bestätigt

Einträge

VulDB provides additional information and datapoints for this CVE:

Quellen

Might our Artificial Intelligence support you?

Check our Alexa App!