Show filters
13 Total Results
Displaying 1-10 of 13
Sort by:
Attacker Value
Unknown

CVE-2017-10982

Disclosure Date: July 17, 2017 (last updated November 26, 2024)
An FR-GV-205 issue in FreeRADIUS 2.x before 2.2.10 allows "DHCP - Buffer over-read in fr_dhcp_decode_options()" and a denial of service.
0
Attacker Value
Unknown

CVE-2017-10981

Disclosure Date: July 17, 2017 (last updated November 26, 2024)
An FR-GV-204 issue in FreeRADIUS 2.x before 2.2.10 allows "DHCP - Memory leak in fr_dhcp_decode()" and a denial of service.
0
Attacker Value
Unknown

CVE-2017-10979

Disclosure Date: July 17, 2017 (last updated November 26, 2024)
An FR-GV-202 issue in FreeRADIUS 2.x before 2.2.10 allows "Write overflow in rad_coalesce()" - this allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code.
0
Attacker Value
Unknown

CVE-2017-10983

Disclosure Date: July 17, 2017 (last updated November 26, 2024)
An FR-GV-206 issue in FreeRADIUS 2.x before 2.2.10 and 3.x before 3.0.15 allows "DHCP - Read overflow when decoding option 63" and a denial of service.
0
Attacker Value
Unknown

CVE-2017-10980

Disclosure Date: July 17, 2017 (last updated November 26, 2024)
An FR-GV-203 issue in FreeRADIUS 2.x before 2.2.10 allows "DHCP - Memory leak in decode_tlv()" and a denial of service.
0
Attacker Value
Unknown

CVE-2014-2015

Disclosure Date: November 02, 2014 (last updated October 05, 2023)
Stack-based buffer overflow in the normify function in the rlm_pap module (modules/rlm_pap/rlm_pap.c) in FreeRADIUS 2.x, possibly 2.2.3 and earlier, and 3.x, possibly 3.0.1 and earlier, might allow attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password hash, as demonstrated by an SSHA hash.
0
Attacker Value
Unknown

CVE-2011-4966

Disclosure Date: March 12, 2013 (last updated October 05, 2023)
modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.
0
Attacker Value
Unknown

CVE-2008-5284

Disclosure Date: November 29, 2008 (last updated October 04, 2023)
The web server in IEA Software RadiusNT and RadiusX 5.1.38 and other versions before 5.1.44, Emerald 5.0.49 and other versions before 5.0.52, Air Marshal 2.0.4 and other versions before 2.0.8, and Radius test client (aka Radlogin) 4.0.20 and earlier, allows remote attackers to cause a denial of service (crash) via an HTTP Content-Length header with a negative value, which triggers a single byte overwrite of memory using a NULL terminator. NOTE: some of these details are obtained from third party information.
0
Attacker Value
Unknown

CVE-2008-4474

Disclosure Date: October 07, 2008 (last updated October 04, 2023)
freeradius-dialupadmin in freeradius 2.0.4 allows local users to overwrite arbitrary files via a symlink attack on temporary files in (1) backup_radacct, (2) clean_radacct, (3) monthly_tot_stats, (4) tot_stats, and (5) truncate_radacct.
0
Attacker Value
Unknown

CVE-2004-0960

Disclosure Date: February 09, 2005 (last updated February 22, 2025)
FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (core dump) via malformed USR vendor-specific attributes (VSA) that cause a memcpy operation with a -1 argument.
0