Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.
| Software | From | Fixed in |
|---|---|---|
| freeradius / freeradius | 2.1.11 | 2.1.11.x |
| freeradius / freeradius | 2.1.12 | 2.1.12.x |
| freeradius / freeradius | 2.1.10 | 2.1.10.x |