CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
High
EPSS
Percentile
91.7%
Buffer overflow in digest calculation function of multiple RADIUS implementations allows remote attackers to cause a denial of service and possibly execute arbitrary code via shared secret data.
Vendor | Product | Version | CPE |
---|---|---|---|
ascend | radius | 1.16 | cpe:2.3:a:ascend:radius:1.16:*:*:*:*:*:*:* |
freeradius | freeradius | 0.2 | cpe:2.3:a:freeradius:freeradius:0.2:*:*:*:*:*:*:* |
freeradius | freeradius | 0.3 | cpe:2.3:a:freeradius:freeradius:0.3:*:*:*:*:*:*:* |
gnu | radius | 0.92.1 | cpe:2.3:a:gnu:radius:0.92.1:*:*:*:*:*:*:* |
gnu | radius | 0.93 | cpe:2.3:a:gnu:radius:0.93:*:*:*:*:*:*:* |
gnu | radius | 0.94 | cpe:2.3:a:gnu:radius:0.94:*:*:*:*:*:*:* |
gnu | radius | 0.95 | cpe:2.3:a:gnu:radius:0.95:*:*:*:*:*:*:* |
icradius | icradius | 0.14 | cpe:2.3:a:icradius:icradius:0.14:*:*:*:*:*:*:* |
icradius | icradius | 0.15 | cpe:2.3:a:icradius:icradius:0.15:*:*:*:*:*:*:* |
icradius | icradius | 0.16 | cpe:2.3:a:icradius:icradius:0.16:*:*:*:*:*:*:* |
archives.neohapsis.com/archives/linux/suse/2002-q2/0362.html
distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000466
marc.info/?l=bugtraq&m=101537153021792&w=2
online.securityfocus.com/archive/1/239784
www.cert.org/advisories/CA-2002-06.html
www.kb.cert.org/vuls/id/589523
www.redhat.com/support/errata/RHSA-2002-030.html
www.securityfocus.com/bid/3530
exchange.xforce.ibmcloud.com/vulnerabilities/7534