CVE-2003-0450
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
07/08/2003
Last modified:
03/04/2025
Description
Cistron RADIUS daemon (radiusd-cistron) 1.6.6 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large value in an NAS-Port attribute, which is interpreted as a negative number and causes a buffer overflow.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:cistron:radius_daemon:*:*:*:*:*:*:*:* | 1.6.6 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=196063
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000664
- http://www.debian.org/security/2003/dsa-321
- http://www.novell.com/linux/security/advisories/2003_030_radiusd_cistron.html
- http://www.turbolinux.com/security/TLSA-2003-40.txt
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=196063
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000664
- http://www.debian.org/security/2003/dsa-321
- http://www.novell.com/linux/security/advisories/2003_030_radiusd_cistron.html
- http://www.turbolinux.com/security/TLSA-2003-40.txt