Vulnerability Description
FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (core dump) via malformed USR vendor-specific attributes (VSA) that cause a memcpy operation with a -1 argument.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freeradius | Freeradius | 0.2 |
| Redhat | Enterprise Linux | 3.0 |
| Redhat | Fedora Core | core_2.0 |
References
- http://security.gentoo.org/glsa/glsa-200409-29.xml
- http://www.kb.cert.org/vuls/id/541574Third Party AdvisoryUS Government Resource
- http://www.securityfocus.com/bid/11222PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17440
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
- http://security.gentoo.org/glsa/glsa-200409-29.xml
- http://www.kb.cert.org/vuls/id/541574Third Party AdvisoryUS Government Resource
- http://www.securityfocus.com/bid/11222PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17440
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
FAQ
What is CVE-2004-0960?
CVE-2004-0960 is a vulnerability with a CVSS score of 5.0 (MEDIUM). FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (core dump) via malformed USR vendor-specific attributes (VSA) that cause a memcpy operation with a -1 argument.
How severe is CVE-2004-0960?
CVE-2004-0960 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-0960?
Check the references section above for vendor advisories and patch information. Affected products include: Freeradius Freeradius, Redhat Enterprise Linux, Redhat Fedora Core.