Process Software Information for VU#589523

Multiple implementations of the RADIUS protocol contain a digest calculation buffer overflow


Not Affected

Vendor Statement

MultiNet and TCPware do not provide a RADIUS implementation.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References



The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.