CVE Vulnerabilities

CVE-2013-4147

Use of Externally-Controlled Format String

Published: Aug 09, 2013 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Multiple format string vulnerabilities in Yet Another Radius Daemon (YARD RADIUS) 1.1.2 allow context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in a request in the (1) log_msg function in log.c or (2) version or (3) build_version function in version.c.

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

NameVendorStart VersionEnd Version
Yard_radiusYard_radius_project1.1.2-4 (including)1.1.2-4 (including)
YardradiusUbuntulucid*
YardradiusUbuntuprecise*
YardradiusUbuntuquantal*
YardradiusUbunturaring*
YardradiusUbuntusaucy*
YardradiusUbuntutrusty*
YardradiusUbuntuupstream*

Potential Mitigations

References