Format string vulnerability in the sqllog function in the SQL accounting code for radiusd in GNU Radius 1.2 and 1.3 allows remote attackers to execute arbitrary code via unknown vectors.
Max CVSS
10.0
EPSS Score
46.34%
Published
2006-11-28
Updated
2017-07-20
Integer overflow in the asn_decode_string() function defined in asn1.c in radiusd for GNU Radius 1.1 and 1.2 before 1.2.94, when compiled with the --enable-snmp option, allows remote attackers to cause a denial of service (daemon crash) via certain SNMP requests.
Max CVSS
5.0
EPSS Score
0.75%
Published
2004-12-23
Updated
2017-07-11
The radius daemon (radiusd) for GNU Radius 1.1, when compiled with the -enable-snmp option, allows remote attackers to cause a denial of service (server crash) via malformed SNMP messages containing an invalid OID.
Max CVSS
5.0
EPSS Score
0.93%
Published
2004-12-06
Updated
2017-07-11
The rad_print_request function in logger.c for GNU Radius daemon (radiusd) before 1.2 allows remote attackers to cause a denial of service (crash) via a UDP packet with an Acct-Status-Type attribute without a value and no Acct-Session-Id attribute, which causes a null dereference.
Max CVSS
5.0
EPSS Score
2.52%
Published
2004-03-03
Updated
2017-10-10
Multiple RADIUS implementations do not properly validate the Vendor-Length of the Vendor-Specific attribute, which allows remote attackers to cause a denial of service (crash) via a Vendor-Length that is less than 2.
Max CVSS
5.0
EPSS Score
0.36%
Published
2002-03-04
Updated
2018-10-30
Buffer overflow in digest calculation function of multiple RADIUS implementations allows remote attackers to cause a denial of service and possibly execute arbitrary code via shared secret data.
Max CVSS
7.5
EPSS Score
3.66%
Published
2002-03-04
Updated
2018-10-30
6 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!