Freeradius

Freeradius

47 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.64%
  • Veröffentlicht 09.02.2005 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Memory leak in FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (memory exhaustion) via a series of Access-Request packets with (1) Ascend-Send-Secret, (2) Ascend-Recv-Secret, or (3) Tunnel-Password attributes.

  • EPSS 2.64%
  • Veröffentlicht 09.02.2005 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (core dump) via malformed USR vendor-specific attributes (VSA) that cause a memcpy operation with a -1 argument.

  • EPSS 5.47%
  • Veröffentlicht 03.11.2004 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (server crash) by sending an Ascend-Send-Secret attribute without the required leading packet.

  • EPSS 5.99%
  • Veröffentlicht 15.12.2003 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

rad_decode in FreeRADIUS 0.9.2 and earlier allows remote attackers to cause a denial of service (crash) via a short RADIUS string attribute with a tag, which causes memcpy to be called with a -1 length argument, as demonstrated using the Tunnel-Passw...

  • EPSS 0.98%
  • Veröffentlicht 25.06.2002 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

FreeRADIUS RADIUS server allows remote attackers to cause a denial of service (CPU consumption) via a flood of Access-Request packets.

  • EPSS 29.86%
  • Veröffentlicht 04.03.2002 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in digest calculation function of multiple RADIUS implementations allows remote attackers to cause a denial of service and possibly execute arbitrary code via shared secret data.

  • EPSS 10.28%
  • Veröffentlicht 04.03.2002 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Multiple RADIUS implementations do not properly validate the Vendor-Length of the Vendor-Specific attribute, which allows remote attackers to cause a denial of service (crash) via a Vendor-Length that is less than 2.