Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-2220

Опубликовано: 31 июл. 2013
Источник: debian
EPSS Низкий

Описание

Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php-radiusfixed1.2.5-2.4package

Примечания

  • https://www.openwall.com/lists/oss-security/2013/06/28/2

EPSS

Процентиль: 85%
0.02798
Низкий

Связанные уязвимости

ubuntu
почти 12 лет назад

Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.

nvd
почти 12 лет назад

Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.

github
около 3 лет назад

Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.

EPSS

Процентиль: 85%
0.02798
Низкий