Количество 8
Количество 8

CVE-2012-3547
Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.

CVE-2012-3547
Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.

CVE-2012-3547
Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.
CVE-2012-3547
Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS ...
GHSA-rv5x-2jxm-gf9c
Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.
ELSA-2012-1327
ELSA-2012-1327: freeradius2 security update (MODERATE)
ELSA-2012-1326
ELSA-2012-1326: freeradius security update (MODERATE)

BDU:2015-03122
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2012-3547 Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate. | CVSS2: 6.8 | 17% Средний | почти 13 лет назад |
![]() | CVE-2012-3547 Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate. | CVSS2: 5 | 17% Средний | почти 13 лет назад |
![]() | CVE-2012-3547 Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate. | CVSS2: 6.8 | 17% Средний | почти 13 лет назад |
CVE-2012-3547 Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS ... | CVSS2: 6.8 | 17% Средний | почти 13 лет назад | |
GHSA-rv5x-2jxm-gf9c Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate. | 17% Средний | больше 3 лет назад | ||
ELSA-2012-1327 ELSA-2012-1327: freeradius2 security update (MODERATE) | почти 13 лет назад | |||
ELSA-2012-1326 ELSA-2012-1326: freeradius security update (MODERATE) | почти 13 лет назад | |||
![]() | BDU:2015-03122 Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации | CVSS2: 6.8 | 17% Средний | почти 13 лет назад |
Уязвимостей на страницу