Bugtraq mailing list archives
RADIUS (Summary)
From: aleph1 () DFW NET (Aleph One)
Date: Sun, 22 Feb 1998 13:07:55 -0600
This is a summary of reports about the radius vulnerability that Phillip R. Jaenke reported. Giving the large number of people that have reported that they are not vulnerable I must wonder what is unique in Phillip's environment that is causing this. Only one person reported Merit RADIUS being vulnerable and that has not been confirmed yet. So far reported not vulnerable: Merit 2.4.23C, Livingston RADIUS 2.0.1 97/5/22 Livingstons RADIUS 2.01 Perl RADIUS module MacRADIUS ESVA Radius Reported vulnerable: Livingston 1.16 to 2.01 (Phillip R. Jaenke) RadiusNT v2.x (Phillip R. Jaenke) merit radius 2.4.23C (jbeley () puma sirinet net) Aleph One / aleph1 () dfw net http://underground.org/ KeyID 1024/948FD6B5 Fingerprint EE C9 E8 AA CB AF 09 61 8C 39 EA 47 A8 6A B8 01
Current thread:
- Fw: tetex-0.4pl8 world-writable database Micha? Zalewski (Feb 20)
- Re: Fw: tetex-0.4pl8 world-writable database Marcin Cieslak (Feb 20)
- Pipe attack - an example Micha? Zalewski (Feb 20)
- cfs-1.4.0beta2 root exploitable bug ther (Feb 20)
- WinGate DoS Matt Carothers (Feb 21)
- Quick update on Radius bug Phillip R. Jaenke (Feb 21)
- Workaround for radius bug Phillip R. Jaenke (Feb 21)
- Re: cfs-1.4.0beta2 root exploitable bug ther (Feb 21)
- resource starvation against passwd(1) Antonomasia (Feb 22)
- RADIUS (Summary) Aleph One (Feb 22)
- Re: RADIUS (Summary) Dave Stewart (Feb 22)
- Re: RADIUS (Summary) Phillip R. Jaenke (Feb 22)
- Re: RADIUS (Summary) Josh Richards (Feb 22)