6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.063 Low
EPSS
Percentile
93.5%
Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS
2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote
attackers to cause a denial of service (server crash) and possibly execute
arbitrary code via a long “not after” timestamp in a client certificate.
Author | Note |
---|---|
sbeattie | possibly mitigated by -fstack-protector upstream report claims 2.1.10-2.1.12 are only affected |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 11.04 | noarch | freeradius | < 2.1.10+dfsg-2ubuntu2.1 | UNKNOWN |
ubuntu | 11.10 | noarch | freeradius | < 2.1.10+dfsg-3ubuntu0.11.10.1 | UNKNOWN |
ubuntu | 12.04 | noarch | freeradius | < 2.1.10+dfsg-3ubuntu0.12.04.1 | UNKNOWN |