Cistron RADIUS Remote Signed NAS-Port Number Expansion Memory Corruption Vulnerability

Bugtraq ID: 7892
Class: Design Error
CVE: CVE-2003-0450
Remote: Yes
Local: No
Published: Jun 13 2003 12:00AM
Updated: Jul 11 2009 10:06PM
Credit: The discovery of this vulnerability has been credited to "David Luyer" <david_luyer@pacific.net.au>.
Vulnerable: Miquel van Smoorenburg Cistron Radius 1.6.6
+ Conectiva Linux 9.0
+ Conectiva Linux 8.0
+ Conectiva Linux 7.0
- RedHat Linux 7.1 i386
- RedHat Linux 7.1 alpha
- RedHat Linux 7.0 i386
- RedHat Linux 7.0 alpha
+ S.u.S.E. Linux 8.0
Miquel van Smoorenburg Cistron Radius 1.6.5
- FreeBSD FreeBSD 4.5
- FreeBSD FreeBSD 4.4
- FreeBSD FreeBSD 4.3
- FreeBSD FreeBSD 4.2
- FreeBSD FreeBSD 4.1.1
- RedHat Linux 7.1 i386
- RedHat Linux 7.1 alpha
- RedHat Linux 7.0 i386
- RedHat Linux 7.0 alpha
Miquel van Smoorenburg Cistron Radius 1.6.4
+ S.u.S.E. Linux 7.3 sparc
+ S.u.S.E. Linux 7.3 ppc
+ S.u.S.E. Linux 7.3 i386
+ S.u.S.E. Linux 7.2 i386
+ S.u.S.E. Linux 7.1 x86
+ S.u.S.E. Linux 7.1 sparc
+ S.u.S.E. Linux 7.1 ppc
+ S.u.S.E. Linux 7.1 alpha
Not Vulnerable:


 

Privacy Statement
Copyright 2010, SecurityFocus