CVE-2013-2220

EUVD-2013-2173
Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 85%
Affected Products (NVD)
VendorProductVersion
radius_extension_projectradius
𝑥
≤ 1.2.6
radius_extension_projectradius
1.1
radius_extension_projectradius
1.2.1
radius_extension_projectradius
1.2.2
radius_extension_projectradius
1.2.3
radius_extension_projectradius
1.2.4
radius_extension_projectradius
1.2.5
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
php-radius
bullseye
1.4.0~b1-12
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
php-radius
lucid
ignored
precise
Fixed 1.2.5-2+squeeze1ubuntu0.12.04.1
released
quantal
ignored
raring
ignored
saucy
ignored
trusty
dne
utopic
ignored
vivid
ignored
wily
not-affected
xenial
not-affected