CVE-2011-2701

The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OCSP is enabled, does not properly parse replies from OCSP responders, which allows remote attackers to bypass authentication by using the EAP-TLS protocol with a revoked X.509 client certificate.
Configurations

Configuration 1 (hide)

cpe:2.3:a:freeradius:freeradius:2.1.11:*:*:*:*:*:*:*

History

No history.

Information

Published : 2011-08-04 02:45

Updated : 2023-12-10 11:03


NVD link : CVE-2011-2701

Mitre link : CVE-2011-2701

CVE.ORG link : CVE-2011-2701


JSON object : View

Products Affected

freeradius

  • freeradius
CWE
CWE-287

Improper Authentication