CVE-2001-1377 (CNNVD-200203-001)

MEDIUM
中文标题:
多个RADIUS实现vendor-length域拒绝服务漏洞
英文标题:
Multiple RADIUS implementations do not properly validate the Vendor-Length of the Vendor-Specific at...
CVSS分数: 5.0
发布时间: 2002-06-11 04:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Remote Authentication Dial In User Service(RADIUS)服务器可用于对使用RADIUS协议的终端进行认证、授权和统计,基于RFC 2865。它可应用多种操作系统之下。 部分RADIUS协议实现中存在一个安全漏洞,由于没有对vendor-specific属性的vendor-length域进行正确验证,远程攻击者可以通过发送包含畸形vendor-specific属性的数据包造成RADIUS服务器或客户端崩溃。 RADIUS服务器和客户端没有正确验证vendor-specific属性里的vendor-length。vendor-length不应小于2。一旦vendor-length小于2,RADIUS服务器(或客户端)就会将该属性长度作为负数计算,这可能造成程序非法访问、异常终止。这一属性长度会被各个函数使用。多数RADIUS服务器中,执行这一计算的函数为rad_recv()或radrecv()。其他使用同一逻辑来验证vendor-specific属性的应用程序也会碰到同一问题。

英文描述:

Multiple RADIUS implementations do not properly validate the Vendor-Length of the Vendor-Specific attribute, which allows remote attackers to cause a denial of service (crash) via a Vendor-Length that is less than 2.

CWE类型:
(暂无数据)
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
freeradius freeradius 0.2 - - cpe:2.3:a:freeradius:freeradius:0.2:*:*:*:*:*:*:*
freeradius freeradius 0.3 - - cpe:2.3:a:freeradius:freeradius:0.3:*:*:*:*:*:*:*
gnu radius 0.92.1 - - cpe:2.3:a:gnu:radius:0.92.1:*:*:*:*:*:*:*
gnu radius 0.93 - - cpe:2.3:a:gnu:radius:0.93:*:*:*:*:*:*:*
gnu radius 0.94 - - cpe:2.3:a:gnu:radius:0.94:*:*:*:*:*:*:*
gnu radius 0.95 - - cpe:2.3:a:gnu:radius:0.95:*:*:*:*:*:*:*
icradius icradius 0.14 - - cpe:2.3:a:icradius:icradius:0.14:*:*:*:*:*:*:*
icradius icradius 0.15 - - cpe:2.3:a:icradius:icradius:0.15:*:*:*:*:*:*:*
icradius icradius 0.16 - - cpe:2.3:a:icradius:icradius:0.16:*:*:*:*:*:*:*
icradius icradius 0.17 - - cpe:2.3:a:icradius:icradius:0.17:*:*:*:*:*:*:*
icradius icradius 0.17b - - cpe:2.3:a:icradius:icradius:0.17b:*:*:*:*:*:*:*
icradius icradius 0.18 - - cpe:2.3:a:icradius:icradius:0.18:*:*:*:*:*:*:*
icradius icradius 0.18.1 - - cpe:2.3:a:icradius:icradius:0.18.1:*:*:*:*:*:*:*
livingston radius 2.0 - - cpe:2.3:a:livingston:radius:2.0:*:*:*:*:*:*:*
livingston radius 2.0.1 - - cpe:2.3:a:livingston:radius:2.0.1:*:*:*:*:*:*:*
livingston radius 2.1 - - cpe:2.3:a:livingston:radius:2.1:*:*:*:*:*:*:*
lucent radius 2.0 - - cpe:2.3:a:lucent:radius:2.0:*:*:*:*:*:*:*
lucent radius 2.0.1 - - cpe:2.3:a:lucent:radius:2.0.1:*:*:*:*:*:*:*
lucent radius 2.1 - - cpe:2.3:a:lucent:radius:2.1:*:*:*:*:*:*:*
miquel_van_smoorenburg_cistron radius 1.6.1 - - cpe:2.3:a:miquel_van_smoorenburg_cistron:radius:1.6.1:*:*:*:*:*:*:*
miquel_van_smoorenburg_cistron radius 1.6.2 - - cpe:2.3:a:miquel_van_smoorenburg_cistron:radius:1.6.2:*:*:*:*:*:*:*
miquel_van_smoorenburg_cistron radius 1.6.3 - - cpe:2.3:a:miquel_van_smoorenburg_cistron:radius:1.6.3:*:*:*:*:*:*:*
miquel_van_smoorenburg_cistron radius 1.6.4 - - cpe:2.3:a:miquel_van_smoorenburg_cistron:radius:1.6.4:*:*:*:*:*:*:*
miquel_van_smoorenburg_cistron radius 1.6.5 - - cpe:2.3:a:miquel_van_smoorenburg_cistron:radius:1.6.5:*:*:*:*:*:*:*
miquel_van_smoorenburg_cistron radius 1.6_.0 - - cpe:2.3:a:miquel_van_smoorenburg_cistron:radius:1.6_.0:*:*:*:*:*:*:*
openradius openradius 0.8 - - cpe:2.3:a:openradius:openradius:0.8:*:*:*:*:*:*:*
openradius openradius 0.9 - - cpe:2.3:a:openradius:openradius:0.9:*:*:*:*:*:*:*
openradius openradius 0.9.1 - - cpe:2.3:a:openradius:openradius:0.9.1:*:*:*:*:*:*:*
openradius openradius 0.9.2 - - cpe:2.3:a:openradius:openradius:0.9.2:*:*:*:*:*:*:*
openradius openradius 0.9.3 - - cpe:2.3:a:openradius:openradius:0.9.3:*:*:*:*:*:*:*
radiusclient radiusclient 0.3.1 - - cpe:2.3:a:radiusclient:radiusclient:0.3.1:*:*:*:*:*:*:*
xtradius xtradius 1.1_pre1 - - cpe:2.3:a:xtradius:xtradius:1.1_pre1:*:*:*:*:*:*:*
xtradius xtradius 1.1_pre2 - - cpe:2.3:a:xtradius:xtradius:1.1_pre2:*:*:*:*:*:*:*
yard_radius yard_radius 1.0.17 - - cpe:2.3:a:yard_radius:yard_radius:1.0.17:*:*:*:*:*:*:*
yard_radius yard_radius 1.0.18 - - cpe:2.3:a:yard_radius:yard_radius:1.0.18:*:*:*:*:*:*:*
yard_radius yard_radius 1.0.19 - - cpe:2.3:a:yard_radius:yard_radius:1.0.19:*:*:*:*:*:*:*
yard_radius yard_radius 1.0_pre13 - - cpe:2.3:a:yard_radius:yard_radius:1.0_pre13:*:*:*:*:*:*:*
yard_radius yard_radius 1.0_pre14 - - cpe:2.3:a:yard_radius:yard_radius:1.0_pre14:*:*:*:*:*:*:*
yard_radius yard_radius 1.0_pre15 - - cpe:2.3:a:yard_radius:yard_radius:1.0_pre15:*:*:*:*:*:*:*
yard_radius_project yard_radius 1.0.16 - - cpe:2.3:a:yard_radius_project:yard_radius:1.0.16:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
RHSA-2002:030 vendor-advisory
cve.org
访问
radius-vendor-attribute-dos(8354) vdb-entry
cve.org
访问
VU#936683 third-party-advisory
cve.org
访问
20020305 SECURITY.NNOV: few vulnerabilities in multiple RADIUS implementations mailing-list
cve.org
访问
SuSE-SA:2002:013 vendor-advisory
cve.org
访问
4230 vdb-entry
cve.org
访问
CLA-2002:466 vendor-advisory
cve.org
访问
CA-2002-06 third-party-advisory
cve.org
访问
FreeBSD-SN-02:02 vendor-advisory
cve.org
访问
CVSS评分详情
5.0
MEDIUM
CVSS向量: AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS版本: 2.0
机密性
NONE
完整性
NONE
可用性
PARTIAL
时间信息
发布时间:
2002-06-11 04:00:00
修改时间:
2024-08-08 04:51:08
创建时间:
2025-11-11 15:32:15
更新时间:
2025-11-11 15:48:47
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2001-1377 2025-11-11 15:17:22 2025-11-11 07:32:15
NVD nvd_CVE-2001-1377 2025-11-11 14:50:27 2025-11-11 07:41:01
CNNVD cnnvd_CNNVD-200203-001 2025-11-11 15:08:40 2025-11-11 07:48:47
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:48:47
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-200203-001; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-200203-001
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:01
cvss_score: 未提取 → 5.0; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:N/I:N/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 40; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • cvss_score: 未提取 -> 5.0
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:N/I:N/A:P
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 40
  • data_sources: ['cve'] -> ['cve', 'nvd']