Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2012-3547

Опубликовано: 18 сент. 2012
Источник: nvd
CVSS2: 6.8
EPSS Средний

Описание

Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:freeradius:freeradius:2.1.10:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.11:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.12:*:*:*:*:*:*:*

EPSS

Процентиль: 95%
0.1756
Средний

6.8 Medium

CVSS2

Дефекты

CWE-119

Связанные уязвимости

ubuntu
почти 13 лет назад

Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.

redhat
почти 13 лет назад

Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.

debian
почти 13 лет назад

Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS ...

github
больше 3 лет назад

Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.

oracle-oval
почти 13 лет назад

ELSA-2012-1327: freeradius2 security update (MODERATE)

EPSS

Процентиль: 95%
0.1756
Средний

6.8 Medium

CVSS2

Дефекты

CWE-119