Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-2220

Опубликовано: 31 июл. 2013
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5

Описание

Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.

РелизСтатусПримечание
devel

not-affected

1.2.5-2.4build1
esm-apps/xenial

not-affected

1.2.5-2.4build1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [1.2.5-2.4build1]]
lucid

ignored

end of life
precise

released

1.2.5-2+squeeze1ubuntu0.12.04.1
quantal

ignored

end of life
raring

ignored

end of life
saucy

ignored

end of life
trusty

not-affected

1.2.5-2.4build1
trusty/esm

DNE

trusty was not-affected [1.2.5-2.4build1]

Показывать по

EPSS

Процентиль: 85%
0.02798
Низкий

7.5 High

CVSS2

Связанные уязвимости

nvd
почти 12 лет назад

Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.

debian
почти 12 лет назад

Buffer overflow in the radius_get_vendor_attr function in the Radius e ...

github
около 3 лет назад

Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.

EPSS

Процентиль: 85%
0.02798
Низкий

7.5 High

CVSS2