Show filters
10 Total Results
Displaying 1-10 of 10
Sort by:
Attacker Value
Unknown

CVE-2013-4147

Disclosure Date: August 09, 2013 (last updated October 05, 2023)
Multiple format string vulnerabilities in Yet Another Radius Daemon (YARD RADIUS) 1.1.2 allow context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in a request in the (1) log_msg function in log.c or (2) version or (3) build_version function in version.c.
0
Attacker Value
Unknown

CVE-2013-2220

Disclosure Date: July 31, 2013 (last updated October 05, 2023)
Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
0
Attacker Value
Unknown

CVE-2011-4966

Disclosure Date: March 12, 2013 (last updated October 05, 2023)
modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.
0
Attacker Value
Unknown

CVE-2009-3111

Disclosure Date: September 09, 2009 (last updated October 04, 2023)
The rad_decode function in FreeRADIUS before 1.1.8 allows remote attackers to cause a denial of service (radiusd crash) via zero-length Tunnel-Password attributes, as demonstrated by a certain module in VulnDisco Pack Professional 7.6 through 8.11. NOTE: this is a regression error related to CVE-2003-0967.
0
Attacker Value
Unknown

CVE-2006-1354

Disclosure Date: March 22, 2006 (last updated February 22, 2025)
Unspecified vulnerability in FreeRADIUS 1.0.0 up to 1.1.0 allows remote attackers to bypass authentication or cause a denial of service (server crash) via "Insufficient input validation" in the EAP-MSCHAPv2 state machine module.
0
Attacker Value
Unknown

CVE-2004-0849

Disclosure Date: December 23, 2004 (last updated February 22, 2025)
Integer overflow in the asn_decode_string() function defined in asn1.c in radiusd for GNU Radius 1.1 and 1.2 before 1.2.94, when compiled with the --enable-snmp option, allows remote attackers to cause a denial of service (daemon crash) via certain SNMP requests.
0
Attacker Value
Unknown

CVE-2004-0576

Disclosure Date: December 06, 2004 (last updated February 22, 2025)
The radius daemon (radiusd) for GNU Radius 1.1, when compiled with the -enable-snmp option, allows remote attackers to cause a denial of service (server crash) via malformed SNMP messages containing an invalid OID.
0
Attacker Value
Unknown

CVE-2004-0131

Disclosure Date: March 03, 2004 (last updated February 22, 2025)
The rad_print_request function in logger.c for GNU Radius daemon (radiusd) before 1.2 allows remote attackers to cause a denial of service (crash) via a UDP packet with an Acct-Status-Type attribute without a value and no Acct-Session-Id attribute, which causes a null dereference.
0
Attacker Value
Unknown

CVE-2001-1377

Disclosure Date: March 04, 2002 (last updated February 22, 2025)
Multiple RADIUS implementations do not properly validate the Vendor-Length of the Vendor-Specific attribute, which allows remote attackers to cause a denial of service (crash) via a Vendor-Length that is less than 2.
0
Attacker Value
Unknown

CVE-2001-1376

Disclosure Date: March 04, 2002 (last updated February 22, 2025)
Buffer overflow in digest calculation function of multiple RADIUS implementations allows remote attackers to cause a denial of service and possibly execute arbitrary code via shared secret data.
0