Lucene search

K

Radius Security Vulnerabilities - CVSS Score 5 - 6

cve
cve

CVE-2001-1377

Multiple RADIUS implementations do not properly validate the Vendor-Length of the Vendor-Specific attribute, which allows remote attackers to cause a denial of service (crash) via a Vendor-Length that is less than 2.

6.6AI Score

0.004EPSS

2002-06-11 04:00 AM
32
cve
cve

CVE-2004-0131

The rad_print_request function in logger.c for GNU Radius daemon (radiusd) before 1.2 allows remote attackers to cause a denial of service (crash) via a UDP packet with an Acct-Status-Type attribute without a value and no Acct-Session-Id attribute, which causes a null dereference.

7AI Score

0.025EPSS

2004-09-01 04:00 AM
32
cve
cve

CVE-2004-0576

The radius daemon (radiusd) for GNU Radius 1.1, when compiled with the -enable-snmp option, allows remote attackers to cause a denial of service (server crash) via malformed SNMP messages containing an invalid OID.

6.6AI Score

0.009EPSS

2004-12-06 05:00 AM
26
cve
cve

CVE-2004-0849

Integer overflow in the asn_decode_string() function defined in asn1.c in radiusd for GNU Radius 1.1 and 1.2 before 1.2.94, when compiled with the --enable-snmp option, allows remote attackers to cause a denial of service (daemon crash) via certain SNMP requests.

6.7AI Score

0.007EPSS

2004-12-23 05:00 AM
57