Vulnerability CVE-2013-4147


Published: 2013-08-09   Modified: 2013-08-10

Description:
Multiple format string vulnerabilities in Yet Another Radius Daemon (YARD RADIUS) 1.1.2 allow context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in a request in the (1) log_msg function in log.c or (2) version or (3) build_version function in version.c.

See advisories in our WLB2 database:
Topic
Author
Date
High
Radius Daemon Multiple Format String Vulnerabilities
Ashiyane Digital...
03.07.2013

Type:

CWE-134

(Uncontrolled Format String)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Yard radius project -> Yard radius 
Yard radius -> Yard radius 

 References:
http://xforce.iss.net/xforce/xfdb/85892
http://seclists.org/oss-sec/2013/q3/145
http://osvdb.org/95518
http://cxsecurity.com/issue/WLB-2013070028
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=714612

Copyright 2024, cxsecurity.com

 

Back to Top