HomeFreeradiusCVE-2012-3547

CVE-2012-3547

UNKNOWN
6.8CVSS
Published: 2012-09-18
Updated: 2025-04-11
AI Analysis

Description

Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.

CVSS Metrics

Vector
AV:N/AC:M/Au:N/C:P/I:P/A:P
Access Vector
network
Access Cmplx
medium
Auth
none
Confidentiality
partial
Integrity
partial
Availability
partial
Weaknesses
CWE-119

Metadata

Primary Vendor
FREERADIUS
Published
9/18/2012
Last Modified
4/11/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

freeradius : freeradiusfreeradius : freeradiusfreeradius : freeradius

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2012-3547 | UNKNOWN Severity | CVEDatabase.com | CVEDatabase.com