Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freeradius vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2019-11234
FreeRADIUS prior to 3.0.19 does not prevent use of reflection for authentication spoofing, aka a "Dragonblood" issue, a similar issue to CVE-2019-9497.
Freeradius Freeradius
Fedoraproject Fedora
Redhat Enterprise Linux 7.0
Canonical Ubuntu Linux 19.04
Canonical Ubuntu Linux 18.10
Canonical Ubuntu Linux 18.04
9.8
CVSSv3
CVE-2019-11235
FreeRADIUS prior to 3.0.19 mishandles the "each participant verifies that the received scalar is within a range, and that the received group element is a valid point on the curve being used" protection mechanism, aka a "Dragonblood" issue, a similar issue to C...
Freeradius Freeradius
Fedoraproject Fedora -
Redhat Enterprise Linux Server Aus 7.6
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Eus 7.6
Redhat Enterprise Linux 7.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Canonical Ubuntu Linux 18.10
Opensuse Leap 15.0
NA
CVE-2001-1377
Multiple RADIUS implementations do not properly validate the Vendor-Length of the Vendor-Specific attribute, which allows remote malicious users to cause a denial of service (crash) via a Vendor-Length that is less than 2.
Freeradius Freeradius 0.2
Icradius Icradius 0.15
Icradius Icradius 0.16
Livingston Radius 2.1
Lucent Radius 2.0
Miquel Van Smoorenburg Cistron Radius 1.6 .0
Openradius Openradius 0.8
Xtradius Xtradius 1.1 Pre2
Yard Radius Project Yard Radius 1.0.16
Freeradius Freeradius 0.3
Gnu Radius 0.92.1
Icradius Icradius 0.17
Icradius Icradius 0.17b
Lucent Radius 2.0.1
Lucent Radius 2.1
Openradius Openradius 0.9
Openradius Openradius 0.9.1
Yard Radius Yard Radius 1.0.17
Yard Radius Yard Radius 1.0.18
Gnu Radius 0.95
Icradius Icradius 0.14
Livingston Radius 2.0
NA
CVE-2001-1376
Buffer overflow in digest calculation function of multiple RADIUS implementations allows remote malicious users to cause a denial of service and possibly execute arbitrary code via shared secret data.
Gnu Radius 0.95
Icradius Icradius 0.14
Livingston Radius 2.0
Livingston Radius 2.0.1
Livingston Radius 2.1
Miquel Van Smoorenburg Cistron Radius 1.6.4
Miquel Van Smoorenburg Cistron Radius 1.6.5
Radiusclient Radiusclient 0.3.1
Xtradius Xtradius 1.1 Pre1
Ascend Radius 1.16
Freeradius Freeradius 0.2
Icradius Icradius 0.15
Icradius Icradius 0.16
Lucent Radius 2.0
Lucent Radius 2.0.1
Miquel Van Smoorenburg Cistron Radius 1.6 .0
Openradius Openradius 0.8
Yard Radius Project Yard Radius 1.0.16
Yard Radius Yard Radius 1.0.17
Gnu Radius 0.93
Gnu Radius 0.94
Icradius Icradius 0.18
7.5
CVSSv3
CVE-2015-9542
add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and cr...
Freeradius Pam Radius 1.4.0
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.10
NA
CVE-2003-0968
Stack-based buffer overflow in SMB_Logon_Server of the rlm_smb experimental module for FreeRADIUS 0.9.3 and previous versions allows remote malicious users to execute arbitrary code via a long User-Password attribute.
3.7
CVSSv3
CVE-2019-9495
The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execute applications is necessary f...
W1.fi Hostapd
W1.fi Wpa Supplicant
Fedoraproject Fedora 28
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Debian Debian Linux 8.0
Synology Radius Server 3.0
Synology Router Manager
Freebsd Freebsd 11.2
Freebsd Freebsd 12.0
NA
CVE-2010-0524
The default configuration of the FreeRADIUS server in Apple Mac OS X Server prior to 10.6.3 permits EAP-TLS authenticated connections on the basis of an arbitrary client certificate, which allows remote malicious users to obtain network connectivity via a crafted RADIUS Access Re...
Apple Mac Os X 10.6.1
Apple Mac Os X 10.6.2
Apple Mac Os X 10.6.0
Apple Mac Os X Server 10.6.0
Apple Mac Os X Server 10.6.1
Apple Mac Os X Server 10.6.2
5.9
CVSSv3
CVE-2019-9494
The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that can be used for full password...
W1.fi Hostapd
W1.fi Wpa Supplicant
Fedoraproject Fedora 28
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Synology Radius Server 3.0
Synology Router Manager
Freebsd Freebsd 11.2
Freebsd Freebsd 12.0
1 Article
6.5
CVSSv3
CVE-2023-4091
A vulnerability exists in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the ...
Samba Samba
Fedoraproject Fedora 39
Redhat Enterprise Linux 8.0
Redhat Storage 3.0
Redhat Enterprise Linux Eus 9.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48700
CVE-2022-48689
CVE-2024-27956
CVE-2023-6363
SQL
NULL pointer dereference
CVE-2023-41830
CVE-2015-2051
arbitrary
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »