Vulnerability Details : CVE-2001-1376
Buffer overflow in digest calculation function of multiple RADIUS implementations allows remote attackers to cause a denial of service and possibly execute arbitrary code via shared secret data.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2001-1376
Probability of exploitation activity in the next 30 days: 3.66%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 90 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2001-1376
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2001-1376
-
http://www.kb.cert.org/vuls/id/589523
US Government Resource
-
http://online.securityfocus.com/archive/1/239784
Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/7534
- http://www.redhat.com/support/errata/RHSA-2002-030.html
-
http://www.securityfocus.com/bid/3530
Patch;Vendor Advisory
-
http://www.cert.org/advisories/CA-2002-06.html
Patch;Third Party Advisory;US Government Resource
- http://marc.info/?l=bugtraq&m=101537153021792&w=2
- http://archives.neohapsis.com/archives/linux/suse/2002-q2/0362.html
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000466
Products affected by CVE-2001-1376
- cpe:2.3:a:gnu:radius:0.95:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:radius:0.93:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:radius:0.94:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:radius:0.92.1:*:*:*:*:*:*:*
- cpe:2.3:a:ascend:radius:1.16:*:*:*:*:*:*:*
- cpe:2.3:a:livingston:radius:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:livingston:radius:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:livingston:radius:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:lucent:radius:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:lucent:radius:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:lucent:radius:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:icradius:icradius:0.14:*:*:*:*:*:*:*
- cpe:2.3:a:icradius:icradius:0.15:*:*:*:*:*:*:*
- cpe:2.3:a:icradius:icradius:0.16:*:*:*:*:*:*:*
- cpe:2.3:a:icradius:icradius:0.18:*:*:*:*:*:*:*
- cpe:2.3:a:icradius:icradius:0.18.1:*:*:*:*:*:*:*
- cpe:2.3:a:icradius:icradius:0.17:*:*:*:*:*:*:*
- cpe:2.3:a:icradius:icradius:0.17b:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:0.2:*:*:*:*:*:*:*
- cpe:2.3:a:freeradius:freeradius:0.3:*:*:*:*:*:*:*
- cpe:2.3:a:miquel_van_smoorenburg_cistron:radius:1.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:miquel_van_smoorenburg_cistron:radius:1.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:miquel_van_smoorenburg_cistron:radius:1.6_.0:*:*:*:*:*:*:*
- cpe:2.3:a:miquel_van_smoorenburg_cistron:radius:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:miquel_van_smoorenburg_cistron:radius:1.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:miquel_van_smoorenburg_cistron:radius:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:openradius:openradius:0.8:*:*:*:*:*:*:*
- cpe:2.3:a:openradius:openradius:0.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:openradius:openradius:0.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:openradius:openradius:0.9:*:*:*:*:*:*:*
- cpe:2.3:a:openradius:openradius:0.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:radiusclient:radiusclient:0.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:xtradius:xtradius:1.1_pre1:*:*:*:*:*:*:*
- cpe:2.3:a:yard_radius:yard_radius:1.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:yard_radius:yard_radius:1.0_pre13:*:*:*:*:*:*:*
- cpe:2.3:a:yard_radius:yard_radius:1.0_pre14:*:*:*:*:*:*:*
- cpe:2.3:a:yard_radius:yard_radius:1.0_pre15:*:*:*:*:*:*:*
- cpe:2.3:a:yard_radius:yard_radius:1.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:yard_radius:yard_radius:1.0.19:*:*:*:*:*:*:*
- cpe:2.3:a:yard_radius_project:yard_radius:1.0.16:*:*:*:*:*:*:*