Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 724815 - (CVE-2011-2701) CVE-2011-2701 freeradius: OCSP does not verify status of certificates
CVE-2011-2701 freeradius: OCSP does not verify status of certificates
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20110715,repor...
: Security
Depends On: 724816
Blocks:
  Show dependency treegraph
 
Reported: 2011-07-21 17:38 EDT by Vincent Danen
Modified: 2015-07-31 02:42 EDT (History)
3 users (show)

See Also:
Fixed In Version: freeradius 2.1.12
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2012-08-08 04:18:26 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
proposed patch from upstream (3.38 KB, patch)
2011-07-22 09:02 EDT, John Dennis
no flags Details | Diff

  None (edit)
Description Vincent Danen 2011-07-21 17:38:06 EDT
DFN-CERT reported [1] a vulnerability in the OCSP feature in FreeRADIUS 2.1.11 where it does not verify the status of a certificate (e.g. if the certificate was revoked).

No further details, or a patch, were provided.  According to the changelog on the FreeRADIUS site [2], OCSP support was added in version 2.1.11:

* OCSP support from Alex Bergmann. See raddb/eap.conf, "ocsp" section.

Therefore earlier versions of FreeRADIUS are not affected by this flaw.

[1] http://seclists.org/oss-sec/2011/q3/105
[2] http://freeradius.org/

Statement:

Not vulnerable. This issue did not affect the versions of freeradius as shipped with Red Hat Enterprise Linux 4, 5, or 6.
Comment 1 Vincent Danen 2011-07-21 17:41:20 EDT
Created freeradius tracking bugs for this issue

Affects: fedora-all [bug 724816]
Comment 2 John Dennis 2011-07-22 09:02:42 EDT
Created attachment 514686 [details]
proposed patch from upstream
Comment 4 Vincent Danen 2011-07-25 17:45:36 EDT
The DFN-CERT advisory is now available: https://www.dfn-cert.de/informationen/Sicherheitsbulletins/dsb-2011-01.html

Note You need to log in before you can comment on or make changes to this bug.