4 results (0.002 seconds)

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 1

Multiple format string vulnerabilities in Yet Another Radius Daemon (YARD RADIUS) 1.1.2 allow context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in a request in the (1) log_msg function in log.c or (2) version or (3) build_version function in version.c. Múltiples vulnerabilidades de formato de cadena en Yet Another Radius Daemon (YARD RADIUS) v1.1.2, lo que permite a atacantes dependientes de contexto provocar una denegación de servicio (caída), o posiblemente ejecutar código arbitrario mediante especificadores de formato de cadena en una petición en (1) la función log_msg function en log.c, o (2) versión, o (3) en la función build_version function en version.c. • https://www.exploit-db.com/exploits/38672 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=714612 http://cxsecurity.com/issue/WLB-2013070028 http://osvdb.org/95518 http://seclists.org/oss-sec/2013/q3/145 https://exchange.xforce.ibmcloud.com/vulnerabilities/85892 • CWE-134: Use of Externally-Controlled Format String •

CVSS: 10.0EPSS: 2%CPEs: 8EXPL: 0

Buffer overflow in the process_menu function in yardradius 1.0.20 allows remote attackers to execute arbitrary code. Desbordamiento de búfer en la función process_menu de yardradius 1.0.20 permite a atacantes remotos ejecutar código de su elección. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278384 http://www.debian.org/security/2004/dsa-598 http://www.securityfocus.com/bid/11753 https://exchange.xforce.ibmcloud.com/vulnerabilities/18270 •

CVSS: 7.5EPSS: 3%CPEs: 40EXPL: 0

Buffer overflow in digest calculation function of multiple RADIUS implementations allows remote attackers to cause a denial of service and possibly execute arbitrary code via shared secret data. • http://archives.neohapsis.com/archives/linux/suse/2002-q2/0362.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000466 http://marc.info/?l=bugtraq&m=101537153021792&w=2 http://online.securityfocus.com/archive/1/239784 http://www.cert.org/advisories/CA-2002-06.html http://www.kb.cert.org/vuls/id/589523 http://www.redhat.com/support/errata/RHSA-2002-030.html http://www.securityfocus.com/bid/3530 https://exchange.xforce.ibmcloud.com/vulnerabilities/7534 •

CVSS: 5.0EPSS: 0%CPEs: 40EXPL: 0

Multiple RADIUS implementations do not properly validate the Vendor-Length of the Vendor-Specific attribute, which allows remote attackers to cause a denial of service (crash) via a Vendor-Length that is less than 2. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02:02.asc http://archives.neohapsis.com/archives/linux/suse/2002-q2/0362.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000466 http://marc.info/?l=bugtraq&m=101537153021792&w=2 http://www.cert.org/advisories/CA-2002-06.html http://www.iss.net/security_center/static/8354.php http://www.kb.cert.org/vuls/id/936683 http://www.redhat.com/support/errata/RHSA-2002-030.html http://www&# •