CVE-2013-2220
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
31/07/2013
Last modified:
11/04/2025
Description
Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:radius_extension_project:radius:*:*:*:*:*:*:*:* | 1.2.6 (including) | |
cpe:2.3:a:radius_extension_project:radius:1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:radius_extension_project:radius:1.2.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:radius_extension_project:radius:1.2.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:radius_extension_project:radius:1.2.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:radius_extension_project:radius:1.2.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:radius_extension_project:radius:1.2.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:*:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=714362
- http://pecl.php.net/package/radius/1.2.7
- http://www.debian.org/security/2013/dsa-2726
- https://github.com/LawnGnome/php-radius/commit/13c149b051f82b709e8d7cc32111e84b49d57234
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=714362
- http://pecl.php.net/package/radius/1.2.7
- http://www.debian.org/security/2013/dsa-2726
- https://github.com/LawnGnome/php-radius/commit/13c149b051f82b709e8d7cc32111e84b49d57234