CVE-2012-3547
freeradius: stack-based buffer overflow via long expiration date fields in client X509 certificates
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.
Desbordamiento de búfer basado en pila en la función cbtls_verify en FreeRADIUS v2.1.10 hasta la v2.1.12, cuando se usan los métodos TLS-based EAP, permite a atacantes remotos provocar una denegación de servicio (caída del servidor) y posiblemente ejecutar código a través de un sellado de tiempo "not after" largo, en un certificado de un cliente.
Multiple vulnerabilities have been found in FreeRADIUS, the worst of which allow execution of arbitrary code or Denial of Service. Versions less than 2.2.0 are affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2012-06-14 CVE Reserved
- 2012-09-18 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
- CWE-121: Stack-based Buffer Overflow
CAPEC
References (22)
URL | Tag | Source |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2012-09/0043.html | Mailing List | |
http://osvdb.org/85325 | Vdb Entry | |
http://secunia.com/advisories/50637 | Third Party Advisory | |
http://secunia.com/advisories/50770 | Third Party Advisory | |
http://www.openwall.com/lists/oss-security/2012/09/10/2 | Mailing List |
|
http://www.pre-cert.de/advisories/PRE-SA-2012-06.txt | X_refsource_misc | |
http://www.securityfocus.com/bid/55483 | Vdb Entry | |
http://www.securitytracker.com/id?1027509 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/78408 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Freeradius Search vendor "Freeradius" | Freeradius Search vendor "Freeradius" for product "Freeradius" | 2.1.10 Search vendor "Freeradius" for product "Freeradius" and version "2.1.10" | - |
Affected
| ||||||
Freeradius Search vendor "Freeradius" | Freeradius Search vendor "Freeradius" for product "Freeradius" | 2.1.11 Search vendor "Freeradius" for product "Freeradius" and version "2.1.11" | - |
Affected
| ||||||
Freeradius Search vendor "Freeradius" | Freeradius Search vendor "Freeradius" for product "Freeradius" | 2.1.12 Search vendor "Freeradius" for product "Freeradius" and version "2.1.12" | - |
Affected
|