CVE-2013-2220
Published: 31 July 2013
Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
Priority
Status
Package | Release | Status |
---|---|---|
php-radius Launchpad, Ubuntu, Debian |
lucid |
Ignored
(end of life)
|
precise |
Released
(1.2.5-2+squeeze1ubuntu0.12.04.1)
|
|
quantal |
Ignored
(end of life)
|
|
raring |
Ignored
(end of life)
|
|
saucy |
Ignored
(end of life)
|
|
trusty |
Does not exist
(trusty was not-affected [1.2.5-2.4build1])
|
|
upstream |
Released
(1.2.7)
|
|
utopic |
Ignored
(end of life)
|
|
vivid |
Ignored
(end of life)
|
|
wily |
Not vulnerable
(1.2.5-2.4build1)
|
|
xenial |
Not vulnerable
(1.2.5-2.4build1)
|
|
Patches: upstream: https://github.com/LawnGnome/php-radius/commit/13c149b051f82b709e8d7cc32111e84b49d57234 |