Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4x5w-qg6w-8rqm

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.

Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.

EPSS

Процентиль: 85%
0.02798
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
почти 12 лет назад

Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.

nvd
почти 12 лет назад

Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.

debian
почти 12 лет назад

Buffer overflow in the radius_get_vendor_attr function in the Radius e ...

EPSS

Процентиль: 85%
0.02798
Низкий

Дефекты

CWE-119