[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2726-1 php-radius -- buffer overflow

ID: oval:org.secpod.oval:def:601075Date: (C)2013-09-25   (M)2022-10-10
Class: PATCHFamily: unix




A buffer overflow has been discovered in the Radius extension for PHP. The function handling Vendor Specific Attributes assumed that the attributes given would always be of valid length. An attacker could use this assumption to trigger a buffer overflow.

Platform:
Debian 7.0
Debian 6.0
Product:
php5-radius
Reference:
DSA-2726-1
CVE-2013-2220
CVE    1
CVE-2013-2220
CPE    3
cpe:/a:php:php5-radius
cpe:/o:debian:debian_linux:6.0
cpe:/o:debian:debian_linux:7.0

© SecPod Technologies