Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2004-0131

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2004-0131
Last Modified 10 Sep 2008 03:25:12
Published 03 Mar 2004 12:00:00
Confidentiality Impact NONE NONE
Integrity Impact NONE NONE
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2004-0131

Summary

The rad_print_request function in logger.c for GNU Radius daemon (radiusd) before 1.2 allows remote atackers to cause a denial of service (crash) via a UDP packet with an Acct-Status-Type attribute without a value and no Acct-Session-Id attribute, which causes a null dereference.

Vulnerable Systems

Application

  • Gnu Radius 1.1


References

CERT-VN - VU#277396

XF - radius-radprintrequest-dos(15046)

BID - 9578

CONFIRM - http://ftp.gnu.org/gnu/radius/radius-1.2.tar.gz

OSVDB - 3824

IDEFENSE - 20040204 GNU Radius Remote Denial of Service Vulnerability

SECUNIA - 10799


Last Updated: 27 May 2016 10:38:29