Memory leak in FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (memory exhaustion) via a series of Access-Request packets with (1) Ascend-Send-Secret, (2) Ascend-Recv-Secret, or (3) Tunnel-Password attributes.
2005-02-09T05:00:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 5.0 (MEDIUM)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | freeradius | freeradius | 0.2 | Yes |
Application | freeradius | freeradius | 0.3 | Yes |
Application | freeradius | freeradius | 0.4 | Yes |
Application | freeradius | freeradius | 0.5 | Yes |
Application | freeradius | freeradius | 0.8 | Yes |
Application | freeradius | freeradius | 0.8.1 | Yes |
Application | freeradius | freeradius | 0.9 | Yes |
Application | freeradius | freeradius | 0.9.1 | Yes |
Application | freeradius | freeradius | 0.9.2 | Yes |
Application | freeradius | freeradius | 0.9.3 | Yes |
Application | freeradius | freeradius | 1.0.0 | Yes |
Operating System | redhat | enterprise_linux | 3.0 | Yes |
Operating System | redhat | enterprise_linux | 3.0 | Yes |
Operating System | redhat | fedora_core | core_2.0 | Yes |