Executive Summary

Informations
Name CVE-2003-0967 First vendor Publication 2003-12-15
Vendor Cve Last vendor Modification 2024-11-20

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

rad_decode in FreeRADIUS 0.9.2 and earlier allows remote attackers to cause a denial of service (crash) via a short RADIUS string attribute with a tag, which causes memcpy to be called with a -1 length argument, as demonstrated using the Tunnel-Password attribute.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0967

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:10917
 
Oval ID: oval:org.mitre.oval:def:10917
Title: rad_decode in FreeRADIUS 0.9.2 and earlier allows remote attackers to cause a denial of service (crash) via a short RADIUS string attribute with a tag, which causes memcpy to be called with a -1 length argument, as demonstrated using the Tunnel-Password attribute.
Description: rad_decode in FreeRADIUS 0.9.2 and earlier allows remote attackers to cause a denial of service (crash) via a short RADIUS string attribute with a tag, which causes memcpy to be called with a -1 length argument, as demonstrated using the Tunnel-Password attribute.
Family: unix Class: vulnerability
Reference(s): CVE-2003-0967
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 15

OpenVAS Exploits

Date Description
2011-08-09 Name : CentOS Update for freeradius CESA-2009:1451 centos5 i386
File : nvt/gb_CESA-2009_1451_freeradius_centos5_i386.nasl
2010-01-15 Name : Mandriva Update for freeradius MDVSA-2009:227-1 (freeradius)
File : nvt/gb_mandriva_MDVSA_2009_227_1.nasl
2009-12-30 Name : FreeBSD Ports: freeradius
File : nvt/freebsd_freeradius5.nasl
2009-11-11 Name : CentOS Security Advisory CESA-2009:1451 (freeradius)
File : nvt/ovcesa2009_1451.nasl
2009-09-21 Name : RedHat Security Advisory RHSA-2009:1451
File : nvt/RHSA_2009_1451.nasl
2009-09-15 Name : Mandrake Security Advisory MDVSA-2009:226 (aria2)
File : nvt/mdksa_2009_226.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
2850 FreeRADIUS Tagged Attribute Handling DoS

FreeRADIUS 0.9.2, and earlier, contains a flaw that may allow a remote denial of service. The issue is triggered when reception of a malformed packet sent to the service occurs, and will result in loss of availability for the service. It is possible to crash the service due to a NULL pointer dereference bug, which can be exploited by sending an "Access-Request" packet containing a "Tunnel-Password" attribute.

Nessus® Vulnerability Scanner

Date Description
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2009-1451.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20090917_freeradius_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2010-01-12 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2009-227.nasl - Type : ACT_GATHER_INFO
2010-01-06 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2009-1451.nasl - Type : ACT_GATHER_INFO
2009-09-18 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2009-1451.nasl - Type : ACT_GATHER_INFO
2009-09-10 Name : The remote Mandriva Linux host is missing a security update.
File : mandriva_MDVSA-2009-226.nasl - Type : ACT_GATHER_INFO
2004-07-06 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2003-386.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://marc.info/?l=bugtraq&m=106935911101493&w=2
http://marc.info/?l=bugtraq&m=106944220426970
http://marc.info/?l=freeradius-users&m=106947389449613&w=2
http://www.redhat.com/support/errata/RHSA-2003-386.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
Date Informations
2024-11-28 23:23:19
  • Multiple Updates
2024-11-28 12:05:47
  • Multiple Updates
2021-05-04 12:02:08
  • Multiple Updates
2021-04-22 01:02:17
  • Multiple Updates
2020-05-24 01:01:29
  • Multiple Updates
2020-05-23 00:15:32
  • Multiple Updates
2017-10-11 09:23:19
  • Multiple Updates
2016-10-18 12:01:14
  • Multiple Updates
2016-04-26 12:38:54
  • Multiple Updates
2014-02-17 10:26:43
  • Multiple Updates
2013-05-11 11:53:19
  • Multiple Updates