7.5
CVSSv2

CVE-2006-1354

Published: 22/03/2006 Updated: 11/10/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Unspecified vulnerability in FreeRADIUS 1.0.0 up to 1.1.0 allows remote malicious users to bypass authentication or cause a denial of service (server crash) via "Insufficient input validation" in the EAP-MSCHAPv2 state machine module.

Vulnerable Product Search on Vulmon Subscribe to Product

freeradius freeradius 1.0.5

freeradius freeradius 1.1.0

freeradius freeradius 1.0.0

freeradius freeradius 1.0.3

freeradius freeradius 1.0.4

freeradius freeradius 1.0.1

freeradius freeradius 1.0.2

Vendor Advisories

Debian Bug report logs - #359042 [CVE-2006-1354] EAP-MSCHAPv2 vulnerability Package: freeradius; Maintainer for freeradius is Debian FreeRADIUS Packaging Team <pkg-freeradius-maintainers@listsaliothdebianorg>; Source for freeradius is src:freeradius (PTS, buildd, popcon) Reported by: Florian Weimer <fw@denebenyode&gt ...
Several problems have been discovered in freeradius, a high-performance and highly configurable RADIUS server The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2005-4744 SuSE researchers have discovered several off-by-one errors may allow remote attackers to cause a denial of service and possibly ...