Vulnerabilities
Vulnerable Software
Freeradius:  >> Freeradius  >> 0.9.3  Security Vulnerabilities
Buffer overflow in the SMB_Connect_Server function in FreeRadius 1.1.3 and earlier allows attackers to execute arbitrary code related to the server desthost field of an SMB_Handle_Type instance. NOTE: the impact of this issue has been disputed by a reliable third party and the vendor, who states that exploitation is limited "only to local administrators who have write access to the server configuration files." CVE concurs with the dispute
CVSS Score
6.6
EPSS Score
0.0
Published
2007-01-05
FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (core dump) via malformed USR vendor-specific attributes (VSA) that cause a memcpy operation with a -1 argument.
CVSS Score
5.0
EPSS Score
0.026
Published
2005-02-09
Memory leak in FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (memory exhaustion) via a series of Access-Request packets with (1) Ascend-Send-Secret, (2) Ascend-Recv-Secret, or (3) Tunnel-Password attributes.
CVSS Score
5.0
EPSS Score
0.026
Published
2005-02-09
FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (server crash) by sending an Ascend-Send-Secret attribute without the required leading packet.
CVSS Score
5.0
EPSS Score
0.055
Published
2004-11-03
Stack-based buffer overflow in SMB_Logon_Server of the rlm_smb experimental module for FreeRADIUS 0.9.3 and earlier allows remote attackers to execute arbitrary code via a long User-Password attribute.
CVSS Score
10.0
EPSS Score
0.025
Published
2003-12-15
FreeRADIUS RADIUS server allows remote attackers to cause a denial of service (CPU consumption) via a flood of Access-Request packets.
CVSS Score
5.0
EPSS Score
0.01
Published
2002-06-25


Contact Us

Shodan ® - All rights reserved