Debian: 2726-1: php-radius: buffer overflow

Posted by Ridcully on Jul 27, 2013 3:42 AM EDT
LinuxSecurity.com; By Benjamin D. Thomas
Mail this story
Print this story

A buffer overflow has been discovered in the Radius extension for PHP. The function handling Vendor Specific Attributes assumed that the attributes given would always be of valid length. An attacker could use this assumption to trigger a buffer overflow.

Full Story

  Nav
» Read more about: Story Type: News Story, Security; Groups: Debian, PHP

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.