oss-sec mailing list archives
Re: CVE request: radsecproxy incorrect x.509 certificate validation
From: Raphael Geissert <geissert () debian org>
Date: Tue, 30 Oct 2012 13:46:21 -0600
Hi again, On Wednesday 17 October 2012 12:48:19 Raphael Geissert wrote:
Ralf Paffrath discovered that radsecproxy may incorrectly accept a client certificate if the certificates chain was validated with the CA settings of one configuration block but the other certificate constraints failed, and the certificate constraints of another configuration block passed (ignoring this other config block's CA settings.) This issue has been fixed in version 1.6.1. However, it introduces a minor regression as it ignores some configuration blocks (see the references for further details.)
While checking the issue I noticed that the same issue also affects radsecproxy's DTLS support, which was not fixed. Upstream has now released version 1.6.2 addressing the vulnerability in its DTLS support code. Now, the thing is that upstream re-used the previously assigned CVE id CVE-2012-4523. According to the guidelines a new id should be assigned since they affect different versions even if the issues are related. So, I guess a new id is in order? References: http://git.nordu.net/?p=radsecproxy.git;a=commit;h=3682c935facf5ccd7fa600644bbb76957155c680 https://postlister.uninett.no/sympa/arc/radsecproxy/2012-10/msg00001.html https://project.nordu.net/browse/RADSECPROXY-43 Regards, -- Raphael Geissert - Debian Developer www.debian.org - get.debian.net
Current thread:
- CVE request: radsecproxy incorrect x.509 certificate validation Raphael Geissert (Oct 17)
- Re: CVE request: radsecproxy incorrect x.509 certificate validation Kurt Seifried (Oct 17)
- Re: CVE request: radsecproxy incorrect x.509 certificate validation Raphael Geissert (Oct 30)
- Re: Re: CVE request: radsecproxy incorrect x.509 certificate validation Kurt Seifried (Oct 31)