~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to retired/CVE-2012-3547

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
PublicDateAtUSN: 2012-09-18
2
 
Candidate: CVE-2012-3547
3
 
PublicDate: 2012-09-18
4
 
References:
5
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3547
6
 
 http://www.pre-cert.de/advisories/PRE-SA-2012-06.txt
7
 
 http://seclists.org/fulldisclosure/2012/Sep/83
8
 
 https://usn.ubuntu.com/usn/usn-1585-1
9
 
Description:
10
 
 Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS
11
 
 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote
12
 
 attackers to cause a denial of service (server crash) and possibly execute
13
 
 arbitrary code via a long "not after" timestamp in a client certificate.
14
 
Ubuntu-Description:
15
 
Notes:
16
 
 sbeattie> possibly mitigated by -fstack-protector
17
 
 sbeattie> upstream report claims 2.1.10-2.1.12 are only affected
18
 
Bugs:
19
 
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687175
20
 
 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3547
21
 
Priority: medium
22
 
Discovered-by: Timo Warns
23
 
Assigned-to: mdeslaur
24
 
 
25
 
Patches_freeradius:
26
 
 upstream: https://github.com/alandekok/freeradius-server/commit/78e5aed56c36a9231bc91ea5f55b3edf88a9d2a4
27
 
Tags_freeradius: stack-protector
28
 
upstream_freeradius: released (2.2.0)
29
 
hardy_freeradius: ignored (reached end-of-life)
30
 
lucid_freeradius: not-affected (code not present)
31
 
natty_freeradius: released (2.1.10+dfsg-2ubuntu2.1)
32
 
oneiric_freeradius: released (2.1.10+dfsg-3ubuntu0.11.10.1)
33
 
precise_freeradius: released (2.1.10+dfsg-3ubuntu0.12.04.1)
34
 
devel_freeradius: not-affected (2.1.12+dfsg-1.1)