First published: Sun Dec 05 2004(Updated: )
Buffer overflow in the process_menu function in yardradius 1.0.20 allows remote attackers to execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
yard RADIUS | =1.0.17 | |
yard RADIUS | =1.0.18 | |
yard RADIUS | =1.0.19 | |
yard RADIUS | =1.0.20 | |
yard RADIUS | =1.0_pre13 | |
yard RADIUS | =1.0_pre14 | |
yard RADIUS | =1.0_pre15 | |
yard RADIUS | =1.0.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0987 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2004-0987, update to a patched version of yardradius that is not affected by the buffer overflow.
CVE-2004-0987 affects yardradius versions 1.0.16 through 1.0.20 and certain pre-release versions.
CVE-2004-0987 can be exploited by remote attackers who can send specially crafted input to the vulnerable yardradius software.
The impact of CVE-2004-0987 includes the possibility of an attacker executing arbitrary code on the affected system.