CVE-2012-3547
18.09.2012, 17:55
Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.Enginsight
Vendor | Product | Version |
---|---|---|
freeradius | freeradius | 2.1.10 |
freeradius | freeradius | 2.1.11 |
freeradius | freeradius | 2.1.12 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References