A remote DoS in FreeRadius was reported on Bugtraq Nov20 (up to
A RADIUS attribute which has a 'tag' (RFC 2868), and is of type
'string', and which is 2-3 octets long, may cause the server to call
'memcpy' with a length argument of '-1'.
CVE name requested
Affects: 3AS 3ES
rad_decode in FreeRADIUS 0.9.2 and earlier allows remote attackers to
cause a denial of service (crash) via a short RADIUS string attribute
with a tag, which causes memcpy to be called with a -1 length
argument, as demonstrated using the Tunnel-Password attribute.
Stack-based buffer overflow in SMB_Logon_Server of the rlm_smb
experimental module for FreeRADIUS 0.9.3 and earlier allows remote
attackers to execute arbitrary code via a long User-Password
(note the latter is only in an experimental non-default module)
errata in progress, currently in QA
*** Bug 111503 has been marked as a duplicate of this bug. ***
An errata has been issued which should help the problem described in this bug report.
This report is therefore being closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files, please follow the link below. You may reopen
this bug report if the solution does not work for you.