Hewlett Packard Information for VU#589523
Multiple implementations of the RADIUS protocol contain a digest calculation buffer overflow
- Vendor Information Help Date Notified: 03 Jan 2002
- Statement Date:
- Date Updated: 20 Feb 2002
We have tested our Version of RADIUS, and we are NOT vulnerable.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.