CVE-2012-3547

Common Vulnerabilities and Exposures

[Previous] [Index] [Next]

Upstream information

CVE-2012-3547 at MITRE

Description

Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.
CVSS v2 Scores
  National Vulnerability Database
Base Score 6.82
Vector AV:N/AC:M/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

SUSE information

SUSE Bugzilla entry: 777834 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE 11.4
  • freeradius-server >= 2.1.10-8.1
  • freeradius-server-debuginfo >= 2.1.10-8.1
  • freeradius-server-debugsource >= 2.1.10-8.1
  • freeradius-server-devel >= 2.1.10-8.1
  • freeradius-server-dialupadmin >= 2.1.10-8.1
  • freeradius-server-doc >= 2.1.10-8.1
  • freeradius-server-libs >= 2.1.10-8.1
  • freeradius-server-libs-debuginfo >= 2.1.10-8.1
  • freeradius-server-utils >= 2.1.10-8.1
  • freeradius-server-utils-debuginfo >= 2.1.10-8.1
Patchnames:
openSUSE-2012-616