First published: Fri Sep 17 2004(Updated: )
Integer overflow in the asn_decode_string() function defined in asn1.c in radiusd for GNU Radius 1.1 and 1.2 before 1.2.94, when compiled with the --enable-snmp option, allows remote attackers to cause a denial of service (daemon crash) via certain SNMP requests.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Radius | =0.96 | |
GNU Radius | =0.93 | |
GNU Radius | =0.95 | |
GNU Radius | =0.94 | |
GNU Radius | =1.2 | |
GNU Radius | =0.92.1 | |
GNU Radius | =1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0849 is classified as a medium severity vulnerability due to its potential to cause denial of service.
To fix CVE-2004-0849, users should upgrade to GNU Radius version 1.2.94 or later.
CVE-2004-0849 affects GNU Radius versions 0.92.1, 0.93, 0.94, 0.95, 0.96, 1.1, and 1.2 when compiled with the --enable-snmp option.
Exploiting CVE-2004-0849 can lead to a crash of the radiusd daemon, resulting in denial of service.
Yes, CVE-2004-0849 is considered a remote vulnerability as it can be triggered by sending specific SNMP requests.