Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:radius_extension_project:radius:*:*:*:*:*:*:*:*", "matchCriteriaId": "24180799-F1E3-4CED-8E56-8D61A853E613", "versionEndIncluding": "1.2.6", "vulnerable": true}, {"criteria": "cpe:2.3:a:radius_extension_project:radius:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "8510CB61-6237-4771-AA4C-1432670100B2", "vulnerable": true}, {"criteria": "cpe:2.3:a:radius_extension_project:radius:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "58E5F87B-D749-4444-A50B-EF757F7D46D9", "vulnerable": true}, {"criteria": "cpe:2.3:a:radius_extension_project:radius:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7EF9F81D-6338-4535-A652-CD43A3DE4462", "vulnerable": true}, {"criteria": "cpe:2.3:a:radius_extension_project:radius:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "D6050AA4-E64C-4885-9192-2C7C556A729D", "vulnerable": true}, {"criteria": "cpe:2.3:a:radius_extension_project:radius:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "40531DA1-C74E-464F-A16E-ED903445E527", "vulnerable": true}, {"criteria": "cpe:2.3:a:radius_extension_project:radius:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "76D949BF-4709-4810-84DD-FB583284637B", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "matchCriteriaId": "58A8B39D-57DF-4D71-BBCA-1D5A19E0A1B9", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value."}, {"lang": "es", "value": "Desbordamiento de b\u00fafer en la funci\u00f3n radius_get_vendor_attr en la extensi\u00f3n Radius anterior a 1.2.7 para PHP, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente la ejecuci\u00f3n de c\u00f3digo arbitraria a trav\u00e9s de un valor alto en Vendor Specific Attributes (VSA)."}], "id": "CVE-2013-2220", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2013-07-31T13:20:27.423", "references": [{"source": "secalert@redhat.com", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=714362"}, {"source": "secalert@redhat.com", "url": "http://pecl.php.net/package/radius/1.2.7"}, {"source": "secalert@redhat.com", "url": "http://www.debian.org/security/2013/dsa-2726"}, {"source": "secalert@redhat.com", "tags": ["Exploit", "Patch"], "url": "https://github.com/LawnGnome/php-radius/commit/13c149b051f82b709e8d7cc32111e84b49d57234"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=714362"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://pecl.php.net/package/radius/1.2.7"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2726"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Patch"], "url": "https://github.com/LawnGnome/php-radius/commit/13c149b051f82b709e8d7cc32111e84b49d57234"}], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-119"}], "source": "nvd@nist.gov", "type": "Primary"}]}