Vulnerabilities > GNU > Radius > 0.94
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2004-12-23 | CVE-2004-0849 | Unspecified vulnerability in GNU Radius Integer overflow in the asn_decode_string() function defined in asn1.c in radiusd for GNU Radius 1.1 and 1.2 before 1.2.94, when compiled with the --enable-snmp option, allows remote attackers to cause a denial of service (daemon crash) via certain SNMP requests. | 5.0 |
2002-03-04 | CVE-2001-1377 | Denial Of Service vulnerability in Multiple Vendor Radius Short Vendor-Length Field Multiple RADIUS implementations do not properly validate the Vendor-Length of the Vendor-Specific attribute, which allows remote attackers to cause a denial of service (crash) via a Vendor-Length that is less than 2. network low complexity freeradius gnu icradius livingston lucent miquel-van-smoorenburg-cistron openradius radiusclient xtradius yard-radius yard-radius-project | 5.0 |
2002-03-04 | CVE-2001-1376 | Buffer Overflow vulnerability in Multiple Vendor RADIUS Digest Calculation Buffer overflow in digest calculation function of multiple RADIUS implementations allows remote attackers to cause a denial of service and possibly execute arbitrary code via shared secret data. network low complexity ascend freeradius gnu icradius livingston lucent miquel-van-smoorenburg-cistron openradius radiusclient xtradius yard-radius yard-radius-project | 7.5 |