Page 3 of 23 results (0.002 seconds)

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

Unspecified vulnerability in FreeRADIUS 1.0.0 up to 1.1.0 allows remote attackers to bypass authentication or cause a denial of service (server crash) via "Insufficient input validation" in the EAP-MSCHAPv2 state machine module. • ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc http://lists.suse.de/archive/suse-security-announce/2006-Mar/0009.html http://rhn.redhat.com/errata/RHSA-2006-0271.html http://secunia.com/advisories/19300 http://secunia.com/advisories/19405 http://secunia.com/advisories/19518 http://secunia.com/advisories/19527 http://secunia.com/advisories/19811 http://secunia.com/advisories/20461 http://securitytracker.com/id?1015795 http://www.debian.org/security •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

SQL injection vulnerability in the rlm_sqlcounter module in FreeRADIUS 1.0.3 and 1.0.4 allows remote attackers to execute arbitrary SQL commands via unknown attack vectors. • http://www.debian.org/security/2006/dsa-1145 http://www.freeradius.org/security.html http://www.mandriva.com/security/advisories?name=MDKSA-2007:092 http://www.osvdb.org/19323 http://www.securityfocus.com/bid/17294 •

CVSS: 7.8EPSS: 2%CPEs: 2EXPL: 0

Multiple buffer overflows in FreeRADIUS 1.0.3 and 1.0.4 allow remote attackers to cause denial of service (crash) via (1) the rlm_sqlcounter module or (2) unknown vectors "while expanding %t". • http://www.debian.org/security/2006/dsa-1145 http://www.freeradius.org/security.html http://www.mandriva.com/security/advisories?name=MDKSA-2006:066 http://www.mandriva.com/security/advisories?name=MDKSA-2007:092 http://www.osvdb.org/19324 http://www.osvdb.org/19325 http://www.securityfocus.com/bid/17293 •

CVSS: 6.4EPSS: 2%CPEs: 2EXPL: 0

Off-by-one error in the sql_error function in sql_unixodbc.c in FreeRADIUS 1.0.2.5-5, and possibly other versions including 1.0.4, might allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing the external database query to fail. NOTE: this single issue is part of a larger-scale disclosure, originally by SUSE, which reported multiple issues that were disputed by FreeRADIUS. Disputed issues included file descriptor leaks, memory disclosure, LDAP injection, and other issues. Without additional information, the most recent FreeRADIUS report is being regarded as the authoritative source for this CVE identifier. • ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc http://rhn.redhat.com/errata/RHSA-2006-0271.html http://secunia.com/advisories/16712 http://secunia.com/advisories/19497 http://secunia.com/advisories/19518 http://secunia.com/advisories/19811 http://secunia.com/advisories/20461 http://www.debian.org/security/2006/dsa-1089 http://www.freeradius.org/security/20050909-response-to-suse.txt http://www.freeradius.org/security/20050909-vendor-sec.txt http: •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

SQL injection vulnerability in the radius_xlat function in the SQL module for FreeRADIUS 1.0.2 and earlier allows remote authenticated users to execute arbitrary SQL commands via (1) group_membership_query, (2) simul_count_query, or (3) simul_verify_query configuration entries. • http://www.derkeiler.com/Mailing-Lists/Full-Disclosure/2005-05/0492.html http://www.freeradius.org/security.html http://www.gentoo.org/security/en/glsa/glsa-200505-13.xml http://www.novell.com/linux/security/advisories/2005_14_sr.html http://www.redhat.com/support/errata/RHSA-2005-524.html http://www.securityfocus.com/bid/13540 http://www.securitytracker.com/alerts/2005/May/1013909.html https://exchange.xforce.ibmcloud.com/vulnerabilities/20449 https://oval.cisecurity.org/repo •