Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
2013-07-31T13:20:27.423
2025-04-11T00:51:21.963
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | radius_extension_project | radius | ≤ 1.2.6 | Yes |
Application | radius_extension_project | radius | 1.1 | Yes |
Application | radius_extension_project | radius | 1.2.1 | Yes |
Application | radius_extension_project | radius | 1.2.2 | Yes |
Application | radius_extension_project | radius | 1.2.3 | Yes |
Application | radius_extension_project | radius | 1.2.4 | Yes |
Application | radius_extension_project | radius | 1.2.5 | Yes |
Application | php | php | * | No |