[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195549

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2546-1 freeradius -- stack-based buffer overflows

ID: oval:org.secpod.oval:def:600885Date: (C)2012-09-13   (M)2023-12-07
Class: PATCHFamily: unix




Timo Warns discovered that the EAP-TLS handling of freeradius, a high-performance and highly configurable RADIUS server, is not properly performing length checks on user-supplied input before copying to a local stack buffer. As a result, an unauthenticated attacker can exploit this flaw to crash the daemon or execute arbitrary code via crafted certificates.

Platform:
Debian 6.0
Product:
freeradius
Reference:
DSA-2546-1
CVE-2012-3547
CVE    1
CVE-2012-3547
CPE    5
cpe:/a:freeradius:freeradius
cpe:/a:freeradius:freeradius:2.1.12
cpe:/a:freeradius:freeradius:2.1.11
cpe:/a:freeradius:freeradius:2.1.10
...

© SecPod Technologies