First published: Thu Jul 21 2011(Updated: )
DFN-CERT reported [1] a vulnerability in the OCSP feature in FreeRADIUS 2.1.11 where it does not verify the status of a certificate (e.g. if the certificate was revoked). No further details, or a patch, were provided. According to the changelog on the FreeRADIUS site [2], OCSP support was added in version 2.1.11: * OCSP support from Alex Bergmann. See raddb/eap.conf, "ocsp" section. Therefore earlier versions of FreeRADIUS are not affected by this flaw. [1] <a href="http://seclists.org/oss-sec/2011/q3/105">http://seclists.org/oss-sec/2011/q3/105</a> [2] <a href="http://freeradius.org/">http://freeradius.org/</a> Statement: Not vulnerable. This issue did not affect the versions of freeradius as shipped with Red Hat Enterprise Linux 4, 5, or 6.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Freeradius Freeradius | =2.1.11 | |
redhat/freeradius | <2.1.12 | 2.1.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.