Computer Security
[EN] securityvulns.ru no-pyccku


php-radius buffer overflow
Published:08.07.2013
Source:
SecurityVulns ID:13153
Type:library
Threat Level:
5/10
Description:Buffer overflow in radius_get_vendor_attr()
Affected:PHP : php-radius 1.2
CVE:CVE-2013-2220 (Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.)
Original documentdocumentMANDRIVA, [ MDVSA-2013:192 ] php-radius (08.07.2013)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod