Show filters
12 Total Results
Displaying 1-10 of 12
Sort by:
Attacker Value
Unknown

CVE-2017-10982

Disclosure Date: July 17, 2017 (last updated November 26, 2024)
An FR-GV-205 issue in FreeRADIUS 2.x before 2.2.10 allows "DHCP - Buffer over-read in fr_dhcp_decode_options()" and a denial of service.
0
Attacker Value
Unknown

CVE-2017-10981

Disclosure Date: July 17, 2017 (last updated November 26, 2024)
An FR-GV-204 issue in FreeRADIUS 2.x before 2.2.10 allows "DHCP - Memory leak in fr_dhcp_decode()" and a denial of service.
0
Attacker Value
Unknown

CVE-2017-10979

Disclosure Date: July 17, 2017 (last updated November 26, 2024)
An FR-GV-202 issue in FreeRADIUS 2.x before 2.2.10 allows "Write overflow in rad_coalesce()" - this allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code.
0
Attacker Value
Unknown

CVE-2017-10983

Disclosure Date: July 17, 2017 (last updated November 26, 2024)
An FR-GV-206 issue in FreeRADIUS 2.x before 2.2.10 and 3.x before 3.0.15 allows "DHCP - Read overflow when decoding option 63" and a denial of service.
0
Attacker Value
Unknown

CVE-2017-10980

Disclosure Date: July 17, 2017 (last updated November 26, 2024)
An FR-GV-203 issue in FreeRADIUS 2.x before 2.2.10 allows "DHCP - Memory leak in decode_tlv()" and a denial of service.
0
Attacker Value
Unknown

CVE-2017-9148

Disclosure Date: May 29, 2017 (last updated November 26, 2024)
The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.
0
Attacker Value
Unknown

CVE-2014-2015

Disclosure Date: November 02, 2014 (last updated October 05, 2023)
Stack-based buffer overflow in the normify function in the rlm_pap module (modules/rlm_pap/rlm_pap.c) in FreeRADIUS 2.x, possibly 2.2.3 and earlier, and 3.x, possibly 3.0.1 and earlier, might allow attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password hash, as demonstrated by an SSHA hash.
0
Attacker Value
Unknown

CVE-2011-4966

Disclosure Date: March 12, 2013 (last updated October 05, 2023)
modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.
0
Attacker Value
Unknown

CVE-2010-3697

Disclosure Date: October 07, 2010 (last updated October 04, 2023)
The wait_for_child_to_die function in main/event.c in FreeRADIUS 2.1.x before 2.1.10, in certain circumstances involving long-term database outages, does not properly handle long queue times for requests, which allows remote attackers to cause a denial of service (daemon crash) by sending many requests.
0
Attacker Value
Unknown

CVE-2001-0534

Disclosure Date: July 21, 2001 (last updated February 22, 2025)
Multiple buffer overflows in RADIUS daemon radiusd in (1) Merit 3.6b and (2) Lucent 2.1-2 RADIUS allow remote attackers to cause a denial of service or execute arbitrary commands.
0