The default configuration of the FreeRADIUS server in Apple Mac OS X Server before 10.6.3 permits EAP-TLS authenticated connections on the basis of an arbitrary client certificate, which allows remote attackers to obtain network connectivity via a crafted RADIUS Access Request message.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html - | |
References | () http://support.apple.com/kb/HT4077 - | |
References | () http://www.securityfocus.com/bid/39234 - |
Information
Published : 2010-03-30 18:30
Updated : 2024-11-21 01:12
NVD link : CVE-2010-0524
Mitre link : CVE-2010-0524
CVE.ORG link : CVE-2010-0524
JSON object : View
Products Affected
apple
- mac_os_x
- mac_os_x_server
CWE
CWE-264
Permissions, Privileges, and Access Controls