Описание
Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 1.2.5-2.4build1 |
esm-apps/xenial | not-affected | 1.2.5-2.4build1 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [1.2.5-2.4build1]] |
lucid | ignored | end of life |
precise | released | 1.2.5-2+squeeze1ubuntu0.12.04.1 |
quantal | ignored | end of life |
raring | ignored | end of life |
saucy | ignored | end of life |
trusty | not-affected | 1.2.5-2.4build1 |
trusty/esm | DNE | trusty was not-affected [1.2.5-2.4build1] |
Показывать по
EPSS
7.5 High
CVSS2
Связанные уязвимости
Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
Buffer overflow in the radius_get_vendor_attr function in the Radius e ...
Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
EPSS
7.5 High
CVSS2