Lucene search

K
freebsdFreeBSD37A5C10F-BF56-11DA-B0E9-00123FFE8333
HistoryMar 21, 2006 - 12:00 a.m.

freeradius -- EAP-MSCHAPv2 Authentication Bypass

2006-03-2100:00:00
vuxml.freebsd.org
31

0.004 Low

EPSS

Percentile

73.4%

Freeradius Security Contact reports:

Insufficient input validation was being done in the
EAP-MSCHAPv2 state machine. A malicious attacker could
manipulate their EAP-MSCHAPv2 client state machine to
potentially convince the server to bypass authentication
checks. This bypassing could also result in the server
crashing.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchfreeradius= 1.0.0UNKNOWN
FreeBSDanynoarchfreeradius< 1.1.1UNKNOWN

0.004 Low

EPSS

Percentile

73.4%