Vulnerabilities > GNU > Radius > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2004-12-23 | CVE-2004-0849 | Unspecified vulnerability in GNU Radius Integer overflow in the asn_decode_string() function defined in asn1.c in radiusd for GNU Radius 1.1 and 1.2 before 1.2.94, when compiled with the --enable-snmp option, allows remote attackers to cause a denial of service (daemon crash) via certain SNMP requests. | 5.0 |
2004-12-06 | CVE-2004-0576 | Unspecified vulnerability in GNU Radius 1.1 The radius daemon (radiusd) for GNU Radius 1.1, when compiled with the -enable-snmp option, allows remote attackers to cause a denial of service (server crash) via malformed SNMP messages containing an invalid OID. | 5.0 |
2004-03-03 | CVE-2004-0131 | Remote Denial Of Service vulnerability in GNU Radius 1.1 The rad_print_request function in logger.c for GNU Radius daemon (radiusd) before 1.2 allows remote attackers to cause a denial of service (crash) via a UDP packet with an Acct-Status-Type attribute without a value and no Acct-Session-Id attribute, which causes a null dereference. | 5.0 |
2002-03-04 | CVE-2001-1377 | Denial Of Service vulnerability in Multiple Vendor Radius Short Vendor-Length Field Multiple RADIUS implementations do not properly validate the Vendor-Length of the Vendor-Specific attribute, which allows remote attackers to cause a denial of service (crash) via a Vendor-Length that is less than 2. network low complexity freeradius gnu icradius livingston lucent miquel-van-smoorenburg-cistron openradius radiusclient xtradius yard-radius yard-radius-project | 5.0 |