CVE-2015-4680

FreeRADIUS 2.2.x before 2.2.8 and 3.0.x before 3.0.9 does not properly check revocation of intermediate CA certificates.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:freeradius:freeradius:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.7:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.8:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:freeradius:freeradius:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.2.7:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:raspberry_pi:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp2:*:*:*:*:*:*

History

21 Nov 2024, 02:31

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00010.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00010.html - Third Party Advisory
References () http://packetstormsecurity.com/files/132415/FreeRADIUS-Insufficient-CRL-Application.html - Patch, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/132415/FreeRADIUS-Insufficient-CRL-Application.html - Patch, Third Party Advisory, VDB Entry
References () http://www.ocert.org/advisories/ocert-2015-008.html - Patch, Third Party Advisory () http://www.ocert.org/advisories/ocert-2015-008.html - Patch, Third Party Advisory
References () http://www.securityfocus.com/archive/1/535810/100/0/threaded - () http://www.securityfocus.com/archive/1/535810/100/0/threaded -
References () http://www.securityfocus.com/bid/75327 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/75327 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1032690 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1032690 - Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=1234975 - Issue Tracking, Patch () https://bugzilla.redhat.com/show_bug.cgi?id=1234975 - Issue Tracking, Patch

Information

Published : 2017-04-05 17:59

Updated : 2024-11-21 02:31


NVD link : CVE-2015-4680

Mitre link : CVE-2015-4680

CVE.ORG link : CVE-2015-4680


JSON object : View

Products Affected

suse

  • linux_enterprise_software_development_kit
  • linux_enterprise_server

freeradius

  • freeradius
CWE
CWE-295

Improper Certificate Validation