Debian Security Advisory 2546-1

newsbot

newsbot

RSS Feed
Debian Linux Security Advisory 2546-1 - Timo Warns discovered that the EAP-TLS handling of freeradius, a high-performance and highly configurable RADIUS server, is not properly performing length checks on user-supplied input before copying to a local stack buffer. As a result, an unauthenticated attacker can exploit this flaw to crash the daemon or execute arbitrary code via crafted certificates.

Weiterlesen...
 

Ähnliche Themen

Debian Security Advisory 2557-1

Red Hat Security Advisory 2012-1326-01

Red Hat Security Advisory 2012-1327-01

Mandriva Linux Security Advisory 2012-159

Debian Security Advisory 2566-1

Zurück
Oben