Memory leak in FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (memory exhaustion) via a series of Access-Request packets with (1) Ascend-Send-Secret, (2) Ascend-Recv-Secret, or (3) Tunnel-Password attributes.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Freeradius | Freeradius | 0.2 (including) | 0.2 (including) |
Freeradius | Freeradius | 0.3 (including) | 0.3 (including) |
Freeradius | Freeradius | 0.4 (including) | 0.4 (including) |
Freeradius | Freeradius | 0.5 (including) | 0.5 (including) |
Freeradius | Freeradius | 0.8 (including) | 0.8 (including) |
Freeradius | Freeradius | 0.8.1 (including) | 0.8.1 (including) |
Freeradius | Freeradius | 0.9 (including) | 0.9 (including) |
Freeradius | Freeradius | 0.9.1 (including) | 0.9.1 (including) |
Freeradius | Freeradius | 0.9.2 (including) | 0.9.2 (including) |
Freeradius | Freeradius | 0.9.3 (including) | 0.9.3 (including) |
Freeradius | Freeradius | 1.0.0 (including) | 1.0.0 (including) |
Red Hat Enterprise Linux 3 | RedHat | freeradius-0:1.0.1-1.RHEL3 | * |