Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2012-1327

Опубликовано: 02 окт. 2012
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2012-1327: freeradius2 security update (MODERATE)

[2.1.12-4]

  • resolves: bug#855315 CVE-2012-3547 freeradius: Stack-based buffer overflow by processing certain expiration date fields of a certificate during x509 certificate validation

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

freeradius2

2.1.12-4.el5_8

freeradius2-krb5

2.1.12-4.el5_8

freeradius2-ldap

2.1.12-4.el5_8

freeradius2-mysql

2.1.12-4.el5_8

freeradius2-perl

2.1.12-4.el5_8

freeradius2-postgresql

2.1.12-4.el5_8

freeradius2-python

2.1.12-4.el5_8

freeradius2-unixODBC

2.1.12-4.el5_8

freeradius2-utils

2.1.12-4.el5_8

Oracle Linux x86_64

freeradius2

2.1.12-4.el5_8

freeradius2-krb5

2.1.12-4.el5_8

freeradius2-ldap

2.1.12-4.el5_8

freeradius2-mysql

2.1.12-4.el5_8

freeradius2-perl

2.1.12-4.el5_8

freeradius2-postgresql

2.1.12-4.el5_8

freeradius2-python

2.1.12-4.el5_8

freeradius2-unixODBC

2.1.12-4.el5_8

freeradius2-utils

2.1.12-4.el5_8

Oracle Linux i386

freeradius2

2.1.12-4.el5_8

freeradius2-krb5

2.1.12-4.el5_8

freeradius2-ldap

2.1.12-4.el5_8

freeradius2-mysql

2.1.12-4.el5_8

freeradius2-perl

2.1.12-4.el5_8

freeradius2-postgresql

2.1.12-4.el5_8

freeradius2-python

2.1.12-4.el5_8

freeradius2-unixODBC

2.1.12-4.el5_8

freeradius2-utils

2.1.12-4.el5_8

Связанные CVE

Связанные уязвимости

ubuntu
почти 13 лет назад

Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.

redhat
почти 13 лет назад

Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.

nvd
почти 13 лет назад

Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.

debian
почти 13 лет назад

Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS ...

github
больше 3 лет назад

Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.