Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:uninett:radsecproxy:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7159418-645F-413E-89D2-EC6EA5544330", "versionEndIncluding": "1.6.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:uninett:radsecproxy:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C4CBC2D4-9F6A-45BE-B140-8352A3BC39DA", "vulnerable": true}, {"criteria": "cpe:2.3:a:uninett:radsecproxy:1.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "C16B610A-1827-4C4E-828E-14E7941E8670", "vulnerable": true}, {"criteria": "cpe:2.3:a:uninett:radsecproxy:1.0:alpha-p1:*:*:*:*:*:*", "matchCriteriaId": "DFAFCCC6-D0EE-4B7A-8DF2-315B36B1FF81", "vulnerable": true}, {"criteria": "cpe:2.3:a:uninett:radsecproxy:1.0:p1:*:*:*:*:*:*", "matchCriteriaId": "EC0A8D36-6EC2-419F-B3C8-6642FE16A8DA", "vulnerable": true}, {"criteria": "cpe:2.3:a:uninett:radsecproxy:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "DDA9FD53-D9FE-43BF-B387-4098770192A1", "vulnerable": true}, {"criteria": "cpe:2.3:a:uninett:radsecproxy:1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "624FD1B7-C746-4C40-9690-0406298ABBD6", "vulnerable": true}, {"criteria": "cpe:2.3:a:uninett:radsecproxy:1.1:beta:*:*:*:*:*:*", "matchCriteriaId": "CE4446A8-E7FD-4138-9576-F96E7D9D6947", "vulnerable": true}, {"criteria": "cpe:2.3:a:uninett:radsecproxy:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "1ED032C3-4C5F-4F15-81BD-0C252F8C1CE0", "vulnerable": true}, {"criteria": "cpe:2.3:a:uninett:radsecproxy:1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B2E1ACF-81C6-4829-9027-144E87CF78D9", "vulnerable": true}, {"criteria": "cpe:2.3:a:uninett:radsecproxy:1.3:beta:*:*:*:*:*:*", "matchCriteriaId": "A216CB0E-C26B-4BDE-9EEE-0608CADB8D93", "vulnerable": true}, {"criteria": "cpe:2.3:a:uninett:radsecproxy:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6707C32A-F4ED-458C-A4FA-5AAAB3CD6725", "vulnerable": true}, {"criteria": "cpe:2.3:a:uninett:radsecproxy:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "B7610379-66F9-4F1F-B49E-36E8463CFE44", "vulnerable": true}, {"criteria": "cpe:2.3:a:uninett:radsecproxy:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "E5D6012D-16D2-46D3-B611-CE792B9C1194", "vulnerable": true}, {"criteria": "cpe:2.3:a:uninett:radsecproxy:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "CD5B48A8-25E5-4628-B0B7-21DE24E2458D", "vulnerable": true}, {"criteria": "cpe:2.3:a:uninett:radsecproxy:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "E63FF14F-C923-4375-98A6-C630F886562A", "vulnerable": true}, {"criteria": "cpe:2.3:a:uninett:radsecproxy:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "D71552E9-B6A1-4772-8D91-5AD0BCD8BF9B", "vulnerable": true}, {"criteria": "cpe:2.3:a:uninett:radsecproxy:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "0022B1B1-1D1C-49F9-BF02-745B1ED33398", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The DTLS support in radsecproxy before 1.6.2 does not properly verify certificates when there are configuration blocks with CA settings that are unrelated to the block being used for verifying the certificate chain, which might allow remote attackers to bypass intended access restrictions and spoof clients, a different vulnerability than CVE-2012-4523."}, {"lang": "es", "value": "El soporte DTLS en radsecproxy antes de v1.6.2 no verifica correctamente certificados cuando hay bloques de configuraci\u00f3n con la configuraci\u00f3n de CA que no est\u00e1n relacionados con el bloque que est\u00e1 siendo utilizado para comprobar la cadena de certificados, lo que podr\u00eda permitir a atacantes remotos evitar las restricciones de acceso previstas y suplantar clientes, una vulnerabilidad diferente a CVE-2012-4523."}], "id": "CVE-2012-4566", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2012-11-20T00:55:01.260", "references": [{"source": "secalert@redhat.com", "url": "http://git.nordu.net/?p=radsecproxy.git%3Ba=commit%3Bh=3682c935facf5ccd7fa600644bbb76957155c680"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/51251"}, {"source": "secalert@redhat.com", "url": "http://www.debian.org/security/2012/dsa-2573"}, {"source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/10/17/7"}, {"source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/10/31/6"}, {"source": "secalert@redhat.com", "url": "https://postlister.uninett.no/sympa/arc/radsecproxy/2012-09/msg00001.html"}, {"source": "secalert@redhat.com", "url": "https://postlister.uninett.no/sympa/arc/radsecproxy/2012-10/msg00001.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.nordu.net/?p=radsecproxy.git%3Ba=commit%3Bh=3682c935facf5ccd7fa600644bbb76957155c680"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/51251"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2573"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/10/17/7"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/10/31/6"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://postlister.uninett.no/sympa/arc/radsecproxy/2012-09/msg00001.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://postlister.uninett.no/sympa/arc/radsecproxy/2012-10/msg00001.html"}], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-264"}], "source": "nvd@nist.gov", "type": "Primary"}]}