Vulnerability Description
Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Radius Extension Project | Radius | <= 1.2.6 |
| Php | Php | All versions |
Related Weaknesses (CWE)
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=714362
- http://pecl.php.net/package/radius/1.2.7
- http://www.debian.org/security/2013/dsa-2726
- https://github.com/LawnGnome/php-radius/commit/13c149b051f82b709e8d7cc32111e84b4ExploitPatch
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=714362
- http://pecl.php.net/package/radius/1.2.7
- http://www.debian.org/security/2013/dsa-2726
- https://github.com/LawnGnome/php-radius/commit/13c149b051f82b709e8d7cc32111e84b4ExploitPatch
FAQ
What is CVE-2013-2220?
CVE-2013-2220 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via...
How severe is CVE-2013-2220?
CVE-2013-2220 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-2220?
Check the references section above for vendor advisories and patch information. Affected products include: Radius Extension Project Radius, Php Php.