FreeRADIUS 3.0.26

CPE Details

FreeRADIUS 3.0.26
3.0.26
2024-02-26
17h49 +00:00
2024-02-26
17h49 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:freeradius:freeradius:3.0.26:*:*:*:*:*:*:*

Informations

Vendor

freeradius

Product

freeradius

Version

3.0.26

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-3596 2024-07-09 12h02 +00:00 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
9
Critical
CVE-2011-4966 2013-03-12 22h00 +00:00 modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.
6
CVE-2002-0318 2003-04-02 03h00 +00:00 FreeRADIUS RADIUS server allows remote attackers to cause a denial of service (CPU consumption) via a flood of Access-Request packets.
5