Show filters
10 Total Results
Displaying 1-10 of 10
Sort by:
Attacker Value
Unknown
CVE-2017-10982
Disclosure Date: July 17, 2017 (last updated November 26, 2024)
An FR-GV-205 issue in FreeRADIUS 2.x before 2.2.10 allows "DHCP - Buffer over-read in fr_dhcp_decode_options()" and a denial of service.
0
Attacker Value
Unknown
CVE-2017-10981
Disclosure Date: July 17, 2017 (last updated November 26, 2024)
An FR-GV-204 issue in FreeRADIUS 2.x before 2.2.10 allows "DHCP - Memory leak in fr_dhcp_decode()" and a denial of service.
0
Attacker Value
Unknown
CVE-2017-10979
Disclosure Date: July 17, 2017 (last updated November 26, 2024)
An FR-GV-202 issue in FreeRADIUS 2.x before 2.2.10 allows "Write overflow in rad_coalesce()" - this allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code.
0
Attacker Value
Unknown
CVE-2017-10983
Disclosure Date: July 17, 2017 (last updated November 26, 2024)
An FR-GV-206 issue in FreeRADIUS 2.x before 2.2.10 and 3.x before 3.0.15 allows "DHCP - Read overflow when decoding option 63" and a denial of service.
0
Attacker Value
Unknown
CVE-2017-10980
Disclosure Date: July 17, 2017 (last updated November 26, 2024)
An FR-GV-203 issue in FreeRADIUS 2.x before 2.2.10 allows "DHCP - Memory leak in decode_tlv()" and a denial of service.
0
Attacker Value
Unknown
CVE-2014-2015
Disclosure Date: November 02, 2014 (last updated October 05, 2023)
Stack-based buffer overflow in the normify function in the rlm_pap module (modules/rlm_pap/rlm_pap.c) in FreeRADIUS 2.x, possibly 2.2.3 and earlier, and 3.x, possibly 3.0.1 and earlier, might allow attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password hash, as demonstrated by an SSHA hash.
0
Attacker Value
Unknown
CVE-2011-4966
Disclosure Date: March 12, 2013 (last updated October 05, 2023)
modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.
0
Attacker Value
Unknown
CVE-2008-5284
Disclosure Date: November 29, 2008 (last updated October 04, 2023)
The web server in IEA Software RadiusNT and RadiusX 5.1.38 and other versions before 5.1.44, Emerald 5.0.49 and other versions before 5.0.52, Air Marshal 2.0.4 and other versions before 2.0.8, and Radius test client (aka Radlogin) 4.0.20 and earlier, allows remote attackers to cause a denial of service (crash) via an HTTP Content-Length header with a negative value, which triggers a single byte overwrite of memory using a NULL terminator. NOTE: some of these details are obtained from third party information.
0
Attacker Value
Unknown
CVE-2001-1377
Disclosure Date: March 04, 2002 (last updated February 22, 2025)
Multiple RADIUS implementations do not properly validate the Vendor-Length of the Vendor-Specific attribute, which allows remote attackers to cause a denial of service (crash) via a Vendor-Length that is less than 2.
0
Attacker Value
Unknown
CVE-2001-1376
Disclosure Date: March 04, 2002 (last updated February 22, 2025)
Buffer overflow in digest calculation function of multiple RADIUS implementations allows remote attackers to cause a denial of service and possibly execute arbitrary code via shared secret data.
0