First published: Mon Mar 04 2002(Updated: )
Multiple RADIUS implementations do not properly validate the Vendor-Length of the Vendor-Specific attribute, which allows remote attackers to cause a denial of service (crash) via a Vendor-Length that is less than 2.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yard Radius Yard Radius | =1.0_pre15 | |
Lucent RADIUS | =2.0 | |
Openradius Openradius | =0.9 | |
Openradius Openradius | =0.9.3 | |
Icradius Icradius | =0.14 | |
GNU Radius | =0.93 | |
Icradius Icradius | =0.18 | |
Openradius Openradius | =0.8 | |
Freeradius Freeradius | =0.3 | |
Icradius Icradius | =0.15 | |
Lucent RADIUS | =2.1 | |
Miquel Van Smoorenburg Cistron Radius | =1.6.4 | |
GNU Radius | =0.95 | |
Icradius Icradius | =0.18.1 | |
Xtradius Xtradius | =1.1_pre1 | |
Lucent RADIUS | =2.0.1 | |
Livingston RADIUS | =2.0.1 | |
Icradius Icradius | =0.17 | |
Icradius Icradius | =0.16 | |
Icradius Icradius | =0.17b | |
GNU Radius | =0.94 | |
Miquel Van Smoorenburg Cistron Radius | =1.6_.0 | |
Yard Radius Yard Radius | =1.0.18 | |
Yard Radius Yard Radius | =1.0.17 | |
Miquel Van Smoorenburg Cistron Radius | =1.6.1 | |
Xtradius Xtradius | =1.1_pre2 | |
GNU Radius | =0.92.1 | |
Miquel Van Smoorenburg Cistron Radius | =1.6.3 | |
Livingston RADIUS | =2.1 | |
Livingston RADIUS | =2.0 | |
Openradius Openradius | =0.9.1 | |
Yard Radius Yard Radius | =1.0_pre13 | |
Radiusclient Radiusclient | =0.3.1 | |
Openradius Openradius | =0.9.2 | |
Miquel Van Smoorenburg Cistron Radius | =1.6.2 | |
Freeradius Freeradius | =0.2 | |
Yard Radius Yard Radius | =1.0_pre14 | |
Miquel Van Smoorenburg Cistron Radius | =1.6.5 | |
Yard Radius Yard Radius | =1.0.19 | |
Yard Radius Project Yard Radius | =1.0.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.