Debian Security Advisory DSA 2726-1 (php-radius - buffer overflow)

Summary
A buffer overflow has been discovered in the Radius extension for PHP. The function handling Vendor Specific Attributes assumed that the attributes given would always be of valid length. An attacker could use this assumption to trigger a buffer overflow.
Solution
For the oldstable distribution (squeeze), this problem has been fixed in version 1.2.5-2+squeeze1. For the stable distribution (wheezy), this problem has been fixed in version 1.2.5-2.3+deb7u1. For the unstable distribution (sid), this problem has been fixed in version 1.2.5-2.4. We recommend that you upgrade your php-radius packages.
Insight
This PECL module for PHP provides full support for RADIUS authentication (RFC 2865) and RADIUS accounting (RFC 2866).
Affected
php-radius on Debian Linux
Detection
This check tests the installed software version using the apt package manager.
References