RADIUS: FreeRADIUS Client Certificate Verification Stack Buffer Overflow
This signature detects attempts to exploit a known flaw in FreeRADIUS Client Certificate Verification. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.
Extended Description
Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.
Affected Products
Freeradius freeradius
References
BugTraq: 55483
CVE: CVE-2012-3547
URL: http://www.debian.org/security/2012/dsa-2546 http://www.ubuntu.com/usn/usn-1585-1/
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Freeradius
6.8