CVE-2012-3547

Common Vulnerabilities and Exposures

[Previous] [Index] [Next]

Upstream information

CVE-2012-3547 at MITRE

Description

Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.

NVD CVSS v2 Base Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

SUSE information

SUSE Bugzilla entry: 777834

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE 11.4
  • freeradius-server >= 2.1.10-8.1
  • freeradius-server-debuginfo >= 2.1.10-8.1
  • freeradius-server-debugsource >= 2.1.10-8.1
  • freeradius-server-devel >= 2.1.10-8.1
  • freeradius-server-dialupadmin >= 2.1.10-8.1
  • freeradius-server-doc >= 2.1.10-8.1
  • freeradius-server-libs >= 2.1.10-8.1
  • freeradius-server-libs-debuginfo >= 2.1.10-8.1
  • freeradius-server-utils >= 2.1.10-8.1
  • freeradius-server-utils-debuginfo >= 2.1.10-8.1
Patchnames:
openSUSE-2012-616