Multiple RADIUS implementations do not properly validate the Vendor-Length of the Vendor-Specific attribute, which allows remote attackers to cause a denial of service (crash) via a Vendor-Length that is less than 2.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:37
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02:02.asc - | |
References | () http://archives.neohapsis.com/archives/linux/suse/2002-q2/0362.html - | |
References | () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000466 - | |
References | () http://marc.info/?l=bugtraq&m=101537153021792&w=2 - | |
References | () http://www.cert.org/advisories/CA-2002-06.html - Patch, Third Party Advisory, US Government Resource | |
References | () http://www.iss.net/security_center/static/8354.php - Patch, Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/936683 - Patch, Third Party Advisory, US Government Resource | |
References | () http://www.redhat.com/support/errata/RHSA-2002-030.html - | |
References | () http://www.securityfocus.com/bid/4230 - Patch, Vendor Advisory |
Information
Published : 2002-03-04 05:00
Updated : 2024-11-20 23:37
NVD link : CVE-2001-1377
Mitre link : CVE-2001-1377
CVE.ORG link : CVE-2001-1377
JSON object : View
Products Affected
livingston
- radius
freeradius
- freeradius
yard_radius
- yard_radius
openradius
- openradius
gnu
- radius
radiusclient
- radiusclient
xtradius
- xtradius
lucent
- radius
yard_radius_project
- yard_radius
icradius
- icradius
miquel_van_smoorenburg_cistron
- radius
CWE