Max CVSS | 7.5 | Min CVSS | 5.0 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2019-17185 | 5.0 |
In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global OpenSSL BN_CTX instance to handle all handshakes. This mean multiple threads use the same BN_CTX instance concurrently, resulting in crashes when concurrent EAP-pwd handshakes are in
|
22-04-2022 - 19:04 | 21-03-2020 - 01:15 | |
CVE-2017-10987 | 5.0 |
An FR-GV-304 issue in FreeRADIUS 3.x before 3.0.15 allows "DHCP - Buffer over-read in fr_dhcp_decode_suboptions()" and a denial of service.
|
03-10-2019 - 00:03 | 17-07-2017 - 17:29 | |
CVE-2019-11235 | 7.5 |
FreeRADIUS before 3.0.19 mishandles the "each participant verifies that the received scalar is within a range, and that the received group element is a valid point on the curve being used" protection mechanism, aka a "Dragonblood" issue, a similar is
|
13-05-2019 - 18:29 | 22-04-2019 - 11:29 | |
CVE-2017-9148 | 7.5 |
The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 80
|
05-01-2018 - 02:31 | 29-05-2017 - 17:29 | |
CVE-2017-10983 | 5.0 |
An FR-GV-206 issue in FreeRADIUS 2.x before 2.2.10 and 3.x before 3.0.15 allows "DHCP - Read overflow when decoding option 63" and a denial of service.
|
05-01-2018 - 02:31 | 17-07-2017 - 17:29 | |
CVE-2014-2015 | 7.5 |
Stack-based buffer overflow in the normify function in the rlm_pap module (modules/rlm_pap/rlm_pap.c) in FreeRADIUS 2.x, possibly 2.2.3 and earlier, and 3.x, possibly 3.0.1 and earlier, might allow attackers to cause a denial of service (crash) and p
|
05-01-2018 - 02:29 | 02-11-2014 - 00:55 | |
CVE-2012-3547 | 6.8 |
Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not af
|
29-08-2017 - 01:31 | 18-09-2012 - 17:55 | |
CVE-2011-4966 | 6.0 |
modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired passwo
|
19-03-2013 - 12:35 | 12-03-2013 - 23:55 |