Funk Software Information for VU#589523

Multiple implementations of the RADIUS protocol contain a digest calculation buffer overflow

Status

Not Affected

Vendor Statement

See http://www.funk.com/News&Events/CERT_resp.asp

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References

None

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.