Vircom Information for VU#589523

Multiple implementations of the RADIUS protocol contain a digest calculation buffer overflow

Status

Affected

Vendor Statement

See http://www.vircom.com/solutions/vopradius/certadvisoryca200206.htm

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References

None

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.