Multiple unspecified vulnerabilities in the CSRadius service in Cisco Secure Access Control Server (ACS) for Windows before 4.1 and ACS Solution Engine before 4.1 allow remote attackers to cause a denial of service (crash) via a crafted RADIUS Access-Request packet. NOTE: it has been reported that at least one issue is a heap-based buffer overflow involving the Tunnel-Password attribute.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/21900 | |
http://www.cisco.com/warp/public/707/cisco-sa-20070105-csacs.shtml | Patch Vendor Advisory |
http://securitytracker.com/id?1017475 | |
http://secunia.com/advisories/23629 | Vendor Advisory |
http://www.kb.cert.org/vuls/id/443108 | US Government Resource |
http://osvdb.org/36125 | |
http://www.vupen.com/english/advisories/2007/0068 | Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/31334 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2006-12-30 21:00
Updated : 2018-10-30 09:25
NVD link : CVE-2006-4097
Mitre link : CVE-2006-4097
JSON object : View
CWE
Products Affected
cisco
- secure_access_control_server