Multiple RADIUS implementations do not properly validate the Vendor-Length of the Vendor-Specific attribute, which allows remote attackers to cause a denial of service (crash) via a Vendor-Length that is less than 2.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Freeradius
Subscribe
|
Freeradius
Subscribe
|
|
Gnu
Subscribe
|
Radius
Subscribe
|
|
Icradius
Subscribe
|
Icradius
Subscribe
|
|
Livingston
Subscribe
|
Radius
Subscribe
|
|
Lucent
Subscribe
|
Radius
Subscribe
|
|
Miquel Van Smoorenburg Cistron
Subscribe
|
Radius
Subscribe
|
|
Openradius
Subscribe
|
Openradius
Subscribe
|
|
Radiusclient
Subscribe
|
Radiusclient
Subscribe
|
|
Redhat
Subscribe
|
Powertools
Subscribe
|
|
Xtradius
Subscribe
|
Xtradius
Subscribe
|
|
Yard Radius
Subscribe
|
Yard Radius
Subscribe
|
|
Yard Radius Project
Subscribe
|
Yard Radius
Subscribe
|
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T04:51:08.453Z
Reserved: 2002-06-11T04:00:00.000Z
Link: CVE-2001-1377
No data.
Status : Deferred
Published: 2002-03-04T05:00:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2001-1377
OpenCVE Enrichment
No data.
Weaknesses