CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
94.3%
The web server in IEA Software RadiusNT and RadiusX 5.1.38 and other versions before 5.1.44, Emerald 5.0.49 and other versions before 5.0.52, Air Marshal 2.0.4 and other versions before 2.0.8, and Radius test client (aka Radlogin) 4.0.20 and earlier, allows remote attackers to cause a denial of service (crash) via an HTTP Content-Length header with a negative value, which triggers a single byte overwrite of memory using a NULL terminator. NOTE: some of these details are obtained from third party information.
Vendor | Product | Version | CPE |
---|---|---|---|
iea_software | air_marshal | 1.0.3 | cpe:2.3:a:iea_software:air_marshal:1.0.3:*:*:*:*:*:*:* |
iea_software | air_marshal | 1.0.4 | cpe:2.3:a:iea_software:air_marshal:1.0.4:*:*:*:*:*:*:* |
iea_software | air_marshal | 1.0.5 | cpe:2.3:a:iea_software:air_marshal:1.0.5:*:*:*:*:*:*:* |
iea_software | air_marshal | 1.0.6 | cpe:2.3:a:iea_software:air_marshal:1.0.6:*:*:*:*:*:*:* |
iea_software | air_marshal | 1.0.7 | cpe:2.3:a:iea_software:air_marshal:1.0.7:*:*:*:*:*:*:* |
iea_software | air_marshal | 1.0.8 | cpe:2.3:a:iea_software:air_marshal:1.0.8:*:*:*:*:*:*:* |
iea_software | air_marshal | 1.0.9 | cpe:2.3:a:iea_software:air_marshal:1.0.9:*:*:*:*:*:*:* |
iea_software | air_marshal | 1.0.10 | cpe:2.3:a:iea_software:air_marshal:1.0.10:*:*:*:*:*:*:* |
iea_software | air_marshal | 1.0.11 | cpe:2.3:a:iea_software:air_marshal:1.0.11:*:*:*:*:*:*:* |
iea_software | air_marshal | 1.0.15 | cpe:2.3:a:iea_software:air_marshal:1.0.15:*:*:*:*:*:*:* |
aluigi.altervista.org/adv/emerdal-adv.txt
secunia.com/advisories/28846
www.iea-software.com/docs/airmarshal1/changes.txt
www.iea-software.com/docs/Emerald5/changes.txt
www.iea-software.com/docs/Radius40/changes.txt
www.securityfocus.com/archive/1/487810/100/200/threaded
www.securityfocus.com/bid/27701
www.vupen.com/english/advisories/2008/0484