Unspecified vulnerability in FreeRADIUS 1.0.0 up to 1.1.0 allows remote attackers to bypass authentication or cause a denial of service (server crash) via Insufficient input validation in the EAP-MSCHAPv2 state machine module.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Freeradius | Freeradius | 1.0.0 (including) | 1.0.0 (including) |
Freeradius | Freeradius | 1.0.1 (including) | 1.0.1 (including) |
Freeradius | Freeradius | 1.0.2 (including) | 1.0.2 (including) |
Freeradius | Freeradius | 1.0.3 (including) | 1.0.3 (including) |
Freeradius | Freeradius | 1.0.4 (including) | 1.0.4 (including) |
Freeradius | Freeradius | 1.0.5 (including) | 1.0.5 (including) |
Freeradius | Freeradius | 1.1.0 (including) | 1.1.0 (including) |
Red Hat Enterprise Linux 3 | RedHat | freeradius-0:1.0.1-2.RHEL3.2 | * |
Red Hat Enterprise Linux 4 | RedHat | freeradius-0:1.0.1-3.RHEL4.3 | * |
Freeradius | Ubuntu | dapper | * |
Freeradius | Ubuntu | upstream | * |