First published: Sat Jul 21 2001(Updated: )
Multiple buffer overflows in RADIUS daemon radiusd in (1) Merit 3.6b and (2) Lucent 2.1-2 RADIUS allow remote attackers to cause a denial of service or execute arbitrary commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Merit Radius | =3.6b | |
Lucent RADIUS | =2.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0534 has a high severity rating due to its potential for remote exploitation and denial of service.
To fix CVE-2001-0534, upgrade to patched versions of Merit RADIUS 3.6c or later and Lucent RADIUS 2.1.3 or later.
Exploiting CVE-2001-0534 can lead to remote code execution or a denial of service on affected RADIUS servers.
CVE-2001-0534 affects Merit RADIUS version 3.6b and Lucent RADIUS version 2.1.2.
Remote attackers can exploit CVE-2001-0534 without authentication, potentially compromising the RADIUS service.