CVE-2006-1354
https://notcve.org/view.php?id=CVE-2006-1354
Unspecified vulnerability in FreeRADIUS 1.0.0 up to 1.1.0 allows remote attackers to bypass authentication or cause a denial of service (server crash) via "Insufficient input validation" in the EAP-MSCHAPv2 state machine module. • ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc http://lists.suse.de/archive/suse-security-announce/2006-Mar/0009.html http://rhn.redhat.com/errata/RHSA-2006-0271.html http://secunia.com/advisories/19300 http://secunia.com/advisories/19405 http://secunia.com/advisories/19518 http://secunia.com/advisories/19527 http://secunia.com/advisories/19811 http://secunia.com/advisories/20461 http://securitytracker.com/id?1015795 http://www.debian.org/security •
CVE-2004-0938
https://notcve.org/view.php?id=CVE-2004-0938
FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (server crash) by sending an Ascend-Send-Secret attribute without the required leading packet. FreeRADIUS anteriores a 1.0.1 permite a atacantes remotos causar una denegación de servicio (caída del servidor) enviando un atributo Ascend-Send-Secret sin el paquete de encabezado requerido. • http://security.gentoo.org/glsa/glsa-200409-29.xml http://www.kb.cert.org/vuls/id/541574 http://www.osvdb.org/10178 http://www.securityfocus.com/bid/11222 https://exchange.xforce.ibmcloud.com/vulnerabilities/17440 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10837 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1347 https://access.redhat.com/security/cve/CVE-2004-0938 https://bugzilla.redhat.com/show_bug •