A remote DoS in FreeRadius was reported on Bugtraq Nov20 (up to version 0.9.2): A RADIUS attribute which has a 'tag' (RFC 2868), and is of type 'string', and which is 2-3 octets long, may cause the server to call 'memcpy' with a length argument of '-1'. CVE name requested Affects: 3AS 3ES
CAN-2003-0967 rad_decode in FreeRADIUS 0.9.2 and earlier allows remote attackers to cause a denial of service (crash) via a short RADIUS string attribute with a tag, which causes memcpy to be called with a -1 length argument, as demonstrated using the Tunnel-Password attribute. CAN-2003-0968 Stack-based buffer overflow in SMB_Logon_Server of the rlm_smb experimental module for FreeRADIUS 0.9.3 and earlier allows remote attackers to execute arbitrary code via a long User-Password attribute. (note the latter is only in an experimental non-default module)
errata in progress, currently in QA
*** Bug 111503 has been marked as a duplicate of this bug. ***
An errata has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2003-386.html