CVE-2013-2220

Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 85%
VendorProductVersion
radius_extension_projectradius
𝑥
≤ 1.2.6
radius_extension_projectradius
1.1
radius_extension_projectradius
1.2.1
radius_extension_projectradius
1.2.2
radius_extension_projectradius
1.2.3
radius_extension_projectradius
1.2.4
radius_extension_projectradius
1.2.5
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
php-radius
bullseye
1.4.0~b1-12
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
php-radius
xenial
not-affected
wily
not-affected
vivid
ignored
utopic
ignored
trusty
dne
saucy
ignored
raring
ignored
quantal
ignored
precise
Fixed 1.2.5-2+squeeze1ubuntu0.12.04.1
released
lucid
ignored