DSA-2546-1 freeradius -- stack-based buffer overflowsID: oval:org.secpod.oval:def:600885 | Date: (C)2012-09-13 (M)2023-12-07 |
Class: PATCH | Family: unix |
Timo Warns discovered that the EAP-TLS handling of freeradius, a high-performance and highly configurable RADIUS server, is not properly performing length checks on user-supplied input before copying to a local stack buffer. As a result, an unauthenticated attacker can exploit this flaw to crash the daemon or execute arbitrary code via crafted certificates.