Описание
Cistron RADIUS daemon (radiusd-cistron) 1.6.6 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large value in an NAS-Port attribute, which is interpreted as a negative number and causes a buffer overflow.
Ссылки
- ExploitPatchVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
- ExploitPatchVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.6.6 (включая)
cpe:2.3:a:cistron:radius_daemon:*:*:*:*:*:*:*:*
EPSS
Процентиль: 87%
0.03402
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
debian
около 22 лет назад
Cistron RADIUS daemon (radiusd-cistron) 1.6.6 and earlier allows remot ...
github
больше 3 лет назад
Cistron RADIUS daemon (radiusd-cistron) 1.6.6 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large value in an NAS-Port attribute, which is interpreted as a negative number and causes a buffer overflow.
EPSS
Процентиль: 87%
0.03402
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other