6.8
CVSSv2

CVE-2012-3547

Published: 18/09/2012 Updated: 29/08/2017
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 up to and including 2.1.12, when using TLS-based EAP methods, allows remote malicious users to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

freeradius freeradius 2.1.10

freeradius freeradius 2.1.12

freeradius freeradius 2.1.11

Vendor Advisories

Debian Bug report logs - #687175 freeradius: CVE-2012-3547 stack-based buffer overflow in EAP-TLS handling Package: freeradius; Maintainer for freeradius is Debian FreeRADIUS Packaging Team <pkg-freeradius-maintainers@listsaliothdebianorg>; Source for freeradius is src:freeradius (PTS, buildd, popcon) Reported by: Nico Go ...
FreeRADIUS could be made to crash or run programs if it received specially crafted network traffic ...
Synopsis Moderate: freeradius security update Type/Severity Security Advisory: Moderate Topic Updated freeradius packages that fix one security issue are now availablefor Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as having moderatesecurity impact A Common Vulnerabi ...
Synopsis Moderate: freeradius2 security update Type/Severity Security Advisory: Moderate Topic Updated freeradius2 packages that fix one security issue are now availablefor Red Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as having moderatesecurity impact A Common Vulnera ...
A buffer overflow flaw was discovered in the way radiusd handled the expiration date field in X509 client certificates A remote attacker could possibly use this flaw to crash radiusd if it were configured to use the certificate or TLS tunnelled authentication methods (such as EAP-TLS, EAP-TTLS, and PEAP) (CVE-2012-3547) ...