Vulnerability Description
The radius daemon (radiusd) for GNU Radius 1.1, when compiled with the -enable-snmp option, allows remote attackers to cause a denial of service (server crash) via malformed SNMP messages containing an invalid OID.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Radius | 1.1 |
References
- http://marc.info/?l=full-disclosure&m=108785242716726&w=2
- http://www.idefense.com/application/poi/display?id=110&type=vulnerabilitiesPatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16466
- http://marc.info/?l=full-disclosure&m=108785242716726&w=2
- http://www.idefense.com/application/poi/display?id=110&type=vulnerabilitiesPatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16466
FAQ
What is CVE-2004-0576?
CVE-2004-0576 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The radius daemon (radiusd) for GNU Radius 1.1, when compiled with the -enable-snmp option, allows remote attackers to cause a denial of service (server crash) via malformed SNMP messages containing a...
How severe is CVE-2004-0576?
CVE-2004-0576 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-0576?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Radius.