CVE-2001-1376 (CNNVD-200203-002)

HIGH
中文标题:
Cistron RADIUS 摘要算法缓冲区溢出漏洞
英文标题:
Buffer overflow in digest calculation function of multiple RADIUS implementations allows remote atta...
CVSS分数: 7.5
发布时间: 2002-06-11 04:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

CVE(CAN) ID: CAN-2001-1376 Cistron是一种流行的RADIUS认证服务器实现。它在一个计算消息摘要的函数中存在一个缓冲 区溢出问题。虽然据信这个漏洞不能被用来执行任意指令,但它可能会导致段错误,从而使服 务器程序崩溃,造成远程拒绝服务攻击。 其他基于Cistron源程序的服务器程序也可能有此漏洞。

英文描述:

Buffer overflow in digest calculation function of multiple RADIUS implementations allows remote attackers to cause a denial of service and possibly execute arbitrary code via shared secret data.

CWE类型:
(暂无数据)
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
ascend radius 1.16 - - cpe:2.3:a:ascend:radius:1.16:*:*:*:*:*:*:*
freeradius freeradius 0.2 - - cpe:2.3:a:freeradius:freeradius:0.2:*:*:*:*:*:*:*
freeradius freeradius 0.3 - - cpe:2.3:a:freeradius:freeradius:0.3:*:*:*:*:*:*:*
gnu radius 0.92.1 - - cpe:2.3:a:gnu:radius:0.92.1:*:*:*:*:*:*:*
gnu radius 0.93 - - cpe:2.3:a:gnu:radius:0.93:*:*:*:*:*:*:*
gnu radius 0.94 - - cpe:2.3:a:gnu:radius:0.94:*:*:*:*:*:*:*
gnu radius 0.95 - - cpe:2.3:a:gnu:radius:0.95:*:*:*:*:*:*:*
icradius icradius 0.14 - - cpe:2.3:a:icradius:icradius:0.14:*:*:*:*:*:*:*
icradius icradius 0.15 - - cpe:2.3:a:icradius:icradius:0.15:*:*:*:*:*:*:*
icradius icradius 0.16 - - cpe:2.3:a:icradius:icradius:0.16:*:*:*:*:*:*:*
icradius icradius 0.17 - - cpe:2.3:a:icradius:icradius:0.17:*:*:*:*:*:*:*
icradius icradius 0.17b - - cpe:2.3:a:icradius:icradius:0.17b:*:*:*:*:*:*:*
icradius icradius 0.18 - - cpe:2.3:a:icradius:icradius:0.18:*:*:*:*:*:*:*
icradius icradius 0.18.1 - - cpe:2.3:a:icradius:icradius:0.18.1:*:*:*:*:*:*:*
livingston radius 2.0 - - cpe:2.3:a:livingston:radius:2.0:*:*:*:*:*:*:*
livingston radius 2.0.1 - - cpe:2.3:a:livingston:radius:2.0.1:*:*:*:*:*:*:*
livingston radius 2.1 - - cpe:2.3:a:livingston:radius:2.1:*:*:*:*:*:*:*
lucent radius 2.0 - - cpe:2.3:a:lucent:radius:2.0:*:*:*:*:*:*:*
lucent radius 2.0.1 - - cpe:2.3:a:lucent:radius:2.0.1:*:*:*:*:*:*:*
lucent radius 2.1 - - cpe:2.3:a:lucent:radius:2.1:*:*:*:*:*:*:*
miquel_van_smoorenburg_cistron radius 1.6.1 - - cpe:2.3:a:miquel_van_smoorenburg_cistron:radius:1.6.1:*:*:*:*:*:*:*
miquel_van_smoorenburg_cistron radius 1.6.2 - - cpe:2.3:a:miquel_van_smoorenburg_cistron:radius:1.6.2:*:*:*:*:*:*:*
miquel_van_smoorenburg_cistron radius 1.6.3 - - cpe:2.3:a:miquel_van_smoorenburg_cistron:radius:1.6.3:*:*:*:*:*:*:*
miquel_van_smoorenburg_cistron radius 1.6.4 - - cpe:2.3:a:miquel_van_smoorenburg_cistron:radius:1.6.4:*:*:*:*:*:*:*
miquel_van_smoorenburg_cistron radius 1.6.5 - - cpe:2.3:a:miquel_van_smoorenburg_cistron:radius:1.6.5:*:*:*:*:*:*:*
miquel_van_smoorenburg_cistron radius 1.6_.0 - - cpe:2.3:a:miquel_van_smoorenburg_cistron:radius:1.6_.0:*:*:*:*:*:*:*
openradius openradius 0.8 - - cpe:2.3:a:openradius:openradius:0.8:*:*:*:*:*:*:*
openradius openradius 0.9 - - cpe:2.3:a:openradius:openradius:0.9:*:*:*:*:*:*:*
openradius openradius 0.9.1 - - cpe:2.3:a:openradius:openradius:0.9.1:*:*:*:*:*:*:*
openradius openradius 0.9.2 - - cpe:2.3:a:openradius:openradius:0.9.2:*:*:*:*:*:*:*
openradius openradius 0.9.3 - - cpe:2.3:a:openradius:openradius:0.9.3:*:*:*:*:*:*:*
radiusclient radiusclient 0.3.1 - - cpe:2.3:a:radiusclient:radiusclient:0.3.1:*:*:*:*:*:*:*
xtradius xtradius 1.1_pre1 - - cpe:2.3:a:xtradius:xtradius:1.1_pre1:*:*:*:*:*:*:*
yard_radius yard_radius 1.0.17 - - cpe:2.3:a:yard_radius:yard_radius:1.0.17:*:*:*:*:*:*:*
yard_radius yard_radius 1.0.18 - - cpe:2.3:a:yard_radius:yard_radius:1.0.18:*:*:*:*:*:*:*
yard_radius yard_radius 1.0.19 - - cpe:2.3:a:yard_radius:yard_radius:1.0.19:*:*:*:*:*:*:*
yard_radius yard_radius 1.0_pre13 - - cpe:2.3:a:yard_radius:yard_radius:1.0_pre13:*:*:*:*:*:*:*
yard_radius yard_radius 1.0_pre14 - - cpe:2.3:a:yard_radius:yard_radius:1.0_pre14:*:*:*:*:*:*:*
yard_radius yard_radius 1.0_pre15 - - cpe:2.3:a:yard_radius:yard_radius:1.0_pre15:*:*:*:*:*:*:*
yard_radius_project yard_radius 1.0.16 - - cpe:2.3:a:yard_radius_project:yard_radius:1.0.16:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
RHSA-2002:030 vendor-advisory
cve.org
访问
20011113 More problems with RADIUS (protocol and implementations) mailing-list
cve.org
访问
radius-message-digest-bo(7534) vdb-entry
cve.org
访问
VU#589523 third-party-advisory
cve.org
访问
20020305 SECURITY.NNOV: few vulnerabilities in multiple RADIUS implementations mailing-list
cve.org
访问
SuSE-SA:2002:013 vendor-advisory
cve.org
访问
3530 vdb-entry
cve.org
访问
CLA-2002:466 vendor-advisory
cve.org
访问
CA-2002-06 third-party-advisory
cve.org
访问
CVSS评分详情
7.5
HIGH
CVSS向量: AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS版本: 2.0
机密性
PARTIAL
完整性
PARTIAL
可用性
PARTIAL
时间信息
发布时间:
2002-06-11 04:00:00
修改时间:
2024-08-08 04:51:08
创建时间:
2025-11-11 15:32:15
更新时间:
2025-11-11 15:48:47
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2001-1376 2025-11-11 15:17:22 2025-11-11 07:32:15
NVD nvd_CVE-2001-1376 2025-11-11 14:50:27 2025-11-11 07:41:01
CNNVD cnnvd_CNNVD-200203-002 2025-11-11 15:08:40 2025-11-11 07:48:47
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:48:47
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-200203-002; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-200203-002
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:01
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.5; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:P/I:P/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 40; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.5
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:P/A:P
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 40
  • data_sources: ['cve'] -> ['cve', 'nvd']