First published: Wed Oct 20 2004(Updated: )
FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (core dump) via malformed USR vendor-specific attributes (VSA) that cause a memcpy operation with a -1 argument.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeRADIUS FreeRADIUS | =0.2 | |
FreeRADIUS FreeRADIUS | =0.3 | |
FreeRADIUS FreeRADIUS | =0.4 | |
FreeRADIUS FreeRADIUS | =0.5 | |
FreeRADIUS FreeRADIUS | =0.8 | |
FreeRADIUS FreeRADIUS | =0.8.1 | |
FreeRADIUS FreeRADIUS | =0.9 | |
FreeRADIUS FreeRADIUS | =0.9.1 | |
FreeRADIUS FreeRADIUS | =0.9.2 | |
FreeRADIUS FreeRADIUS | =0.9.3 | |
FreeRADIUS FreeRADIUS | =1.0.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Fedora Core | =core_2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0960 has a severity rating that indicates a denial of service vulnerability affecting FreeRADIUS.
To fix CVE-2004-0960, upgrade FreeRADIUS to version 1.0.1 or later.
CVE-2004-0960 affects FreeRADIUS versions prior to 1.0.1, including 0.2 through 0.9.3.
CVE-2004-0960 is a denial of service vulnerability caused by malformed vendor-specific attributes.
Yes, CVE-2004-0960 can be exploited remotely by attackers sending specially crafted requests.