Funk Software Information for VU#589523
Multiple implementations of the RADIUS protocol contain a digest calculation buffer overflow
- Vendor Information Help Date Notified: 05 Mar 2002
- Statement Date:
- Date Updated: 28 Mar 2002
Status
Not Affected
Vendor Statement
See http://www.funk.com/News&Events/CERT_resp.asp
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Vendor References
None
Addendum
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.