Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gw8r-wq33-8jjw

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

The rad_print_request function in logger.c for GNU Radius daemon (radiusd) before 1.2 allows remote attackers to cause a denial of service (crash) via a UDP packet with an Acct-Status-Type attribute without a value and no Acct-Session-Id attribute, which causes a null dereference.

The rad_print_request function in logger.c for GNU Radius daemon (radiusd) before 1.2 allows remote attackers to cause a denial of service (crash) via a UDP packet with an Acct-Status-Type attribute without a value and no Acct-Session-Id attribute, which causes a null dereference.

EPSS

Процентиль: 89%
0.04342
Низкий

Связанные уязвимости

nvd
почти 22 года назад

The rad_print_request function in logger.c for GNU Radius daemon (radiusd) before 1.2 allows remote attackers to cause a denial of service (crash) via a UDP packet with an Acct-Status-Type attribute without a value and no Acct-Session-Id attribute, which causes a null dereference.

EPSS

Процентиль: 89%
0.04342
Низкий