Vulnerability Description
Multiple buffer overflows in FreeRADIUS 1.0.3 and 1.0.4 allow remote attackers to cause denial of service (crash) via (1) the rlm_sqlcounter module or (2) unknown vectors "while expanding %t".
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freeradius | Freeradius | 1.0.3 |
References
- http://www.debian.org/security/2006/dsa-1145
- http://www.freeradius.org/security.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:066
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:092
- http://www.osvdb.org/19324
- http://www.osvdb.org/19325
- http://www.securityfocus.com/bid/17293Patch
- http://www.debian.org/security/2006/dsa-1145
- http://www.freeradius.org/security.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:066
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:092
- http://www.osvdb.org/19324
- http://www.osvdb.org/19325
- http://www.securityfocus.com/bid/17293Patch
FAQ
What is CVE-2005-4746?
CVE-2005-4746 is a vulnerability with a CVSS score of 7.8 (HIGH). Multiple buffer overflows in FreeRADIUS 1.0.3 and 1.0.4 allow remote attackers to cause denial of service (crash) via (1) the rlm_sqlcounter module or (2) unknown vectors "while expanding %t".
How severe is CVE-2005-4746?
CVE-2005-4746 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-4746?
Check the references section above for vendor advisories and patch information. Affected products include: Freeradius Freeradius.