~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
Candidate: CVE-2013-4147
PublicDate: 2013-08-09
References:
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4147
 http://www.openwall.com/lists/oss-security/2013/07/19/1
Description:
 Multiple format string vulnerabilities in Yet Another Radius Daemon (YARD
 RADIUS) 1.1.2 allow context-dependent attackers to cause a denial of
 service (crash) or possibly execute arbitrary code via format string
 specifiers in a request in the (1) log_msg function in log.c or (2) version
 or (3) build_version function in version.c.
Ubuntu-Description:
Notes:
Bugs:
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=714612
 https://bugs.launchpad.net/ubuntu/+source/yardradius/+bug/1196265
Priority: medium
Discovered-by:
Assigned-to:

Patches_yardradius:
upstream_yardradius: needed
lucid_yardradius: ignored (reached end-of-life)
precise_yardradius: ignored (reached end-of-life)
precise/esm_yardradius: DNE (precise was needed)
quantal_yardradius: ignored (reached end-of-life)
raring_yardradius: ignored (reached end-of-life)
saucy_yardradius: ignored (reached end-of-life)
trusty_yardradius: needed
utopic_yardradius: DNE
vivid_yardradius: DNE
vivid/stable-phone-overlay_yardradius: DNE
vivid/ubuntu-core_yardradius: DNE
wily_yardradius: DNE
xenial_yardradius: DNE
yakkety_yardradius: DNE
zesty_yardradius: DNE
devel_yardradius: DNE