Vulnerability Name:

CVE-2003-0967 (CCN-13806)

Assigned:2003-11-20
Published:2003-11-20
Updated:2017-10-11
Summary:rad_decode in FreeRADIUS 0.9.2 and earlier allows remote attackers to cause a denial of service (crash) via a short RADIUS string attribute with a tag, which causes memcpy to be called with a -1 length argument, as demonstrated using the Tunnel-Password attribute.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: BugTraq Mailing List, Thu Nov 20 2003 - 14:03:30 CST
Remote DoS in FreeRADIUS, all versions.

Source: CCN
Type: BugTraq Mailing List, Fri Nov 21 2003 - 07:07:49 CST
FreeRADIUS 0.9.2 "Tunnel-Password" attribute Handling Vulnerability

Source: CCN
Type: S-Quadra Advisory #2003-11-21
FreeRADIUS 0.9.2 "Tunnel-Password" attribute Handling Vulnerability

Source: MITRE
Type: CNA
CVE-2003-0967

Source: BUGTRAQ
Type: UNKNOWN
20031120 Remote DoS in FreeRADIUS, all versions.

Source: BUGTRAQ
Type: UNKNOWN
20031121 FreeRADIUS 0.9.2 "Tunnel-Password" attribute Handling Vulnerability

Source: CONFIRM
Type: UNKNOWN
http://marc.info/?l=freeradius-users&m=106947389449613&w=2

Source: CCN
Type: RHSA-2003-386
freeradius security update

Source: CCN
Type: FreeRADIUS Web site
FreeRADIUS - building the perfect RADIUS server

Source: CCN
Type: GLSA-200311-04
FreeRADIUS: heap exploit and NULL pointer dereference vulnerability

Source: REDHAT
Type: UNKNOWN
RHSA-2003:386

Source: XF
Type: UNKNOWN
freeradius-accesspacket-dos(13806)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:10917

Vulnerable Configuration:Configuration 1:
  • cpe:/a:freeradius:freeradius:*:*:*:*:*:*:*:* (Version <= 0.9.2)

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20030967
    V
    CVE-2003-0967
    2015-11-16
    oval:org.mitre.oval:def:10917
    V
    rad_decode in FreeRADIUS 0.9.2 and earlier allows remote attackers to cause a denial of service (crash) via a short RADIUS string attribute with a tag, which causes memcpy to be called with a -1 length argument, as demonstrated using the Tunnel-Password attribute.
    2013-04-29
    oval:com.ubuntu.precise:def:20030967000
    V
    CVE-2003-0967 on Ubuntu 12.04 LTS (precise) - low.
    2012-08-23
    oval:com.redhat.rhsa:def:20030386
    P
    RHSA-2003:386: freeradius security update (Moderate)
    2003-12-10
    BACK
    freeradius freeradius *