[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

247085

 
 

909

 
 

194218

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2726-1 php-radius -- buffer overflow

ID: oval:org.secpod.oval:def:601075Date: (C)2013-09-25   (M)2022-10-10
Class: PATCHFamily: unix




A buffer overflow has been discovered in the Radius extension for PHP. The function handling Vendor Specific Attributes assumed that the attributes given would always be of valid length. An attacker could use this assumption to trigger a buffer overflow.

Platform:
Debian 7.0
Debian 6.0
Product:
php5-radius
Reference:
DSA-2726-1
CVE-2013-2220
CVE    1
CVE-2013-2220
CPE    3
cpe:/a:php:php5-radius
cpe:/o:debian:debian_linux:6.0
cpe:/o:debian:debian_linux:7.0

© SecPod Technologies