-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2726-1 security@debian.org http://www.debian.org/security/ Thijs Kinkhorst July 25, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : php-radius Vulnerability : buffer overflow Problem type : remote Debian-specific: no CVE ID : CVE-2013-2220 Debian Bug : 714362 A buffer overflow has been discovered in the Radius extension for PHP. The function handling Vendor Specific Attributes assumed that the attributes given would always be of valid length. An attacker could use this assumption to trigger a buffer overflow. For the oldstable distribution (squeeze), this problem has been fixed in version 1.2.5-2+squeeze1. For the stable distribution (wheezy), this problem has been fixed in version 1.2.5-2.3+deb7u1. For the unstable distribution (sid), this problem has been fixed in version 1.2.5-2.4. We recommend that you upgrade your php-radius packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQEcBAEBAgAGBQJR8WeZAAoJEFb2GnlAHawEfPsIAIlkhbFODB0zhGK/vN6FCD5R 9c4wTmCjaYEJPigMwB/JvxflpcekRvAY7pnk49s2/sERo8BqXk8SbNcplOusjpzk +rSLhZfR5f7uXyJaq1/SGfX45cohXkqycWEe6c7snUUU5RDBXHY5umY817m4BUsx q48B6mS4EkxoQU0PZXstQ8BVfsnWOq2F10QEPlqds3eZxH73roAiGOlEmHQA3Zv6 UhcVuNiqnedx2iYP9lfVUKokLVSPsSFz9QFhXrluZe0JUgeBa+w9Hny1r7aE3eC8 Y5ArS9+3g+Gaz+8ae4jlqi18fNNzz9b+qOk0kdOKnQc3BsGVxRPrVTuJkDktLsE= =Ch+C -----END PGP SIGNATURE-----