CVE-2012-3547 | Date: (C)2012-09-18 (M)2018-04-16 |
Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.
CVSS Score and Metrics +CVSS Score and Metrics -CVSS V3 Severity: | CVSS V2 Severity: |
CVSS Score : | CVSS Score : 6.8 |
Exploit Score: | Exploit Score: 8.6 |
Impact Score: | Impact Score: 6.4 |
|
CVSS V3 Metrics: | CVSS V2 Metrics: |
Attack Vector: | Access Vector: NETWORK |
Attack Complexity: | Access Complexity: MEDIUM |
Privileges Required: | Authentication: NONE |
User Interaction: | Confidentiality: PARTIAL |
Scope: | Integrity: PARTIAL |
Confidentiality: | Availability: PARTIAL |
Integrity: | |
Availability: | |
| |