Memory leak in FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (memory exhaustion) via a series of Access-Request packets with (1) Ascend-Send-Secret, (2) Ascend-Recv-Secret, or (3) Tunnel-Password attributes.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/11222 | Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/541574 | Third Party Advisory US Government Resource |
http://security.gentoo.org/glsa/glsa-200409-29.xml | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17440 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10024 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2005-02-08 21:00
Updated : 2017-10-10 18:29
NVD link : CVE-2004-0961
Mitre link : CVE-2004-0961
JSON object : View
CWE
Products Affected
freeradius
- freeradius
redhat
- enterprise_linux
- fedora_core