Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freeradius vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2019-11234
FreeRADIUS prior to 3.0.19 does not prevent use of reflection for authentication spoofing, aka a "Dragonblood" issue, a similar issue to CVE-2019-9497.
Freeradius Freeradius
Fedoraproject Fedora
Redhat Enterprise Linux 7.0
Canonical Ubuntu Linux 19.04
Canonical Ubuntu Linux 18.10
Canonical Ubuntu Linux 18.04
7.5
CVSSv2
CVE-2019-11235
FreeRADIUS prior to 3.0.19 mishandles the "each participant verifies that the received scalar is within a range, and that the received group element is a valid point on the curve being used" protection mechanism, aka a "Dragonblood" issue, a similar issue to C...
Freeradius Freeradius
Fedoraproject Fedora -
Redhat Enterprise Linux Server Aus 7.6
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Eus 7.6
Redhat Enterprise Linux 7.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Canonical Ubuntu Linux 18.10
Opensuse Leap 15.0
7.5
CVSSv2
CVE-2001-1376
Buffer overflow in digest calculation function of multiple RADIUS implementations allows remote malicious users to cause a denial of service and possibly execute arbitrary code via shared secret data.
Gnu Radius 0.95
Icradius Icradius 0.14
Livingston Radius 2.0
Livingston Radius 2.0.1
Livingston Radius 2.1
Miquel Van Smoorenburg Cistron Radius 1.6.4
Miquel Van Smoorenburg Cistron Radius 1.6.5
Radiusclient Radiusclient 0.3.1
Xtradius Xtradius 1.1 Pre1
Ascend Radius 1.16
Freeradius Freeradius 0.2
Icradius Icradius 0.15
Icradius Icradius 0.16
Lucent Radius 2.0
Lucent Radius 2.0.1
Miquel Van Smoorenburg Cistron Radius 1.6 .0
Openradius Openradius 0.8
Yard Radius Project Yard Radius 1.0.16
Yard Radius Yard Radius 1.0.17
Gnu Radius 0.93
Gnu Radius 0.94
Icradius Icradius 0.18
5
CVSSv2
CVE-2001-1377
Multiple RADIUS implementations do not properly validate the Vendor-Length of the Vendor-Specific attribute, which allows remote malicious users to cause a denial of service (crash) via a Vendor-Length that is less than 2.
Freeradius Freeradius 0.2
Icradius Icradius 0.15
Icradius Icradius 0.16
Livingston Radius 2.1
Lucent Radius 2.0
Miquel Van Smoorenburg Cistron Radius 1.6 .0
Openradius Openradius 0.8
Xtradius Xtradius 1.1 Pre2
Yard Radius Project Yard Radius 1.0.16
Freeradius Freeradius 0.3
Gnu Radius 0.92.1
Icradius Icradius 0.17
Icradius Icradius 0.17b
Lucent Radius 2.0.1
Lucent Radius 2.1
Openradius Openradius 0.9
Openradius Openradius 0.9.1
Yard Radius Yard Radius 1.0.17
Yard Radius Yard Radius 1.0.18
Gnu Radius 0.95
Icradius Icradius 0.14
Livingston Radius 2.0
5
CVSSv2
CVE-2015-9542
add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and cr...
Freeradius Pam Radius 1.4.0
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.10
10
CVSSv2
CVE-2003-0968
Stack-based buffer overflow in SMB_Logon_Server of the rlm_smb experimental module for FreeRADIUS 0.9.3 and previous versions allows remote malicious users to execute arbitrary code via a long User-Password attribute.
4.3
CVSSv2
CVE-2019-9495
The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execute applications is necessary f...
W1.fi Hostapd
W1.fi Wpa Supplicant
Fedoraproject Fedora 28
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Debian Debian Linux 8.0
Synology Radius Server 3.0
Synology Router Manager
Freebsd Freebsd 11.2
Freebsd Freebsd 12.0
7.5
CVSSv2
CVE-2010-0524
The default configuration of the FreeRADIUS server in Apple Mac OS X Server prior to 10.6.3 permits EAP-TLS authenticated connections on the basis of an arbitrary client certificate, which allows remote malicious users to obtain network connectivity via a crafted RADIUS Access Re...
Apple Mac Os X 10.6.1
Apple Mac Os X 10.6.2
Apple Mac Os X 10.6.0
Apple Mac Os X Server 10.6.0
Apple Mac Os X Server 10.6.1
Apple Mac Os X Server 10.6.2
4.3
CVSSv2
CVE-2019-9494
The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that can be used for full password...
W1.fi Hostapd
W1.fi Wpa Supplicant
Fedoraproject Fedora 28
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Synology Radius Server 3.0
Synology Router Manager
Freebsd Freebsd 11.2
Freebsd Freebsd 12.0
1 Article
NA
CVE-2023-4091
A vulnerability exists in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the ...
Samba Samba
Fedoraproject Fedora 39
Redhat Enterprise Linux 8.0
Redhat Storage 3.0
Redhat Enterprise Linux Eus 9.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »