5
CVSSv2

CVE-2009-3111

Published: 09/09/2009 Updated: 19/09/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The rad_decode function in FreeRADIUS prior to 1.1.8 allows remote malicious users to cause a denial of service (radiusd crash) via zero-length Tunnel-Password attributes, as demonstrated by a certain module in VulnDisco Pack Professional 7.6 up to and including 8.11. NOTE: this is a regression error related to CVE-2003-0967.

Vulnerable Product Search on Vulmon Subscribe to Product

freeradius freeradius 0.2

freeradius freeradius 0.4

freeradius freeradius 1.0.3

freeradius freeradius 1.0.4

freeradius freeradius

freeradius freeradius 1.0.2

freeradius freeradius 0.9

freeradius freeradius 0.8.1

freeradius freeradius 1.1.5

freeradius freeradius 1.0.5

freeradius freeradius 0.3

freeradius freeradius 0.8

freeradius freeradius 0.5

freeradius freeradius 1.0.1

freeradius freeradius 1.1.3

freeradius freeradius 0.9.1

freeradius freeradius 0.9.2

freeradius freeradius 0.9.3

freeradius freeradius 1.0.0

freeradius freeradius 1.1.0

freeradius freeradius 1.1.6

Vendor Advisories

It was discovered that FreeRADIUS did not correctly handle certain malformed attributes A remote attacker could exploit this flaw and cause the FreeRADIUS server to crash, resulting in a denial of service ...

Exploits

#!/usr/bin/env python # FreeRadius Packet Of Death # Matthew Gillespie 2009-09-11 # Requires RadiusAttr tracsecdevorg/scapy/attachment/ticket/92/radiuslibpy # wwwbraindeadprojectscom/blog/what/freeradius-packet-of-death/ import sys from scapyall import IP,UDP,send,Radius,RadiusAttr if len(sysargv) != 2: print "Usage: radius_ ...