Lucene search

K

Radius Security Vulnerabilities - February

cve
cve

CVE-2001-1376

Buffer overflow in digest calculation function of multiple RADIUS implementations allows remote attackers to cause a denial of service and possibly execute arbitrary code via shared secret data.

8AI Score

0.037EPSS

2002-06-11 04:00 AM
32
cve
cve

CVE-2001-1377

Multiple RADIUS implementations do not properly validate the Vendor-Length of the Vendor-Specific attribute, which allows remote attackers to cause a denial of service (crash) via a Vendor-Length that is less than 2.

6.6AI Score

0.004EPSS

2002-06-11 04:00 AM
32
cve
cve

CVE-2004-0131

The rad_print_request function in logger.c for GNU Radius daemon (radiusd) before 1.2 allows remote attackers to cause a denial of service (crash) via a UDP packet with an Acct-Status-Type attribute without a value and no Acct-Session-Id attribute, which causes a null dereference.

7AI Score

0.025EPSS

2004-09-01 04:00 AM
32
cve
cve

CVE-2004-0576

The radius daemon (radiusd) for GNU Radius 1.1, when compiled with the -enable-snmp option, allows remote attackers to cause a denial of service (server crash) via malformed SNMP messages containing an invalid OID.

6.6AI Score

0.009EPSS

2004-12-06 05:00 AM
26
cve
cve

CVE-2004-0849

Integer overflow in the asn_decode_string() function defined in asn1.c in radiusd for GNU Radius 1.1 and 1.2 before 1.2.94, when compiled with the --enable-snmp option, allows remote attackers to cause a denial of service (daemon crash) via certain SNMP requests.

6.7AI Score

0.007EPSS

2004-12-23 05:00 AM
56
cve
cve

CVE-2006-4181

Format string vulnerability in the sqllog function in the SQL accounting code for radiusd in GNU Radius 1.2 and 1.3 allows remote attackers to execute arbitrary code via unknown vectors.

7.9AI Score

0.313EPSS

2006-11-28 02:07 AM
24