CVE-2013-4147

Published Aug 9, 2013

Last updated 7 years ago

Overview

Description
Multiple format string vulnerabilities in Yet Another Radius Daemon (YARD RADIUS) 1.1.2 allow context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in a request in the (1) log_msg function in log.c or (2) version or (3) build_version function in version.c.
Source
secalert@redhat.com
NVD status
Modified

Social media

Hype score
Not currently trending

Risk scores

CVSS 2.0

Type
Primary
Base score
7.5
Impact score
6.4
Exploitability score
10
Vector string
AV:N/AC:L/Au:N/C:P/I:P/A:P

Weaknesses

nvd@nist.gov
CWE-134

Evaluator

Comment
Per: http://seclists.org/oss-sec/2013/q3/145 "Software name : YardRadius Version : 1.1.2-4"
Impact
-
Solution
-

Configurations