CVE Vulnerabilities

CVE-2013-4147

Use of Externally-Controlled Format String

Published: Aug 09, 2013 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

Multiple format string vulnerabilities in Yet Another Radius Daemon (YARD RADIUS) 1.1.2 allow context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in a request in the (1) log_msg function in log.c or (2) version or (3) build_version function in version.c.

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

Name Vendor Start Version End Version
Yard_radius Yard_radius_project 1.1.2-4 (including) 1.1.2-4 (including)
Yardradius Ubuntu lucid *
Yardradius Ubuntu precise *
Yardradius Ubuntu quantal *
Yardradius Ubuntu raring *
Yardradius Ubuntu saucy *
Yardradius Ubuntu trusty *
Yardradius Ubuntu upstream *

Potential Mitigations

References