CVE-2010-0524

Severity

75%

Complexity

99%

Confidentiality

106%

The default configuration of the FreeRADIUS server in Apple Mac OS X Server before 10.6.3 permits EAP-TLS authenticated connections on the basis of an arbitrary client certificate, which allows remote attackers to obtain network connectivity via a crafted RADIUS Access Request message.

The default configuration of the FreeRADIUS server in Apple Mac OS X Server before 10.6.3 permits EAP-TLS authenticated connections on the basis of an arbitrary client certificate, which allows remote attackers to obtain network connectivity via a crafted RADIUS Access Request message.

CVSS 2.0 Base Score 7.5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P).

Overview

Type

Apple Mac OS X

First reported 14 years ago

2010-03-30 18:30:00

Last updated 14 years ago

2010-05-21 05:57:00

Affected Software

Apple Mac OS X 10.6.0

10.6.0

Apple Mac OS X 10.6.1

10.6.1

Apple Mac OS X 10.6.2

10.6.2

Apple Mac OS X Server 10.6.0

10.6.0

Apple Mac OS X Server 10.6.1

10.6.1

Apple Mac OS X Server 10.6.2

10.6.2

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.