VYPR
Unrated severityNVD Advisory· Published Sep 9, 2009· Updated Apr 23, 2026

CVE-2009-3111

CVE-2009-3111

Description

The rad_decode function in FreeRADIUS before 1.1.8 allows remote attackers to cause a denial of service (radiusd crash) via zero-length Tunnel-Password attributes, as demonstrated by a certain module in VulnDisco Pack Professional 7.6 through 8.11. NOTE: this is a regression error related to CVE-2003-0967.

Affected products

21
  • cpe:2.3:a:freeradius:freeradius:*:*:*:*:*:*:*:*+ 20 more
    • cpe:2.3:a:freeradius:freeradius:*:*:*:*:*:*:*:*range: <=1.1.7
    • cpe:2.3:a:freeradius:freeradius:0.2:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:0.3:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:0.4:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:0.5:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:0.8:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:0.8.1:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:0.9:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:0.9.1:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:1.1.5:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:1.1.6:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:0.9.2:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:0.9.3:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:1.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:1.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:1.0.2:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:1.0.3:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:1.0.4:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:1.0.5:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:1.1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:1.1.3:*:*:*:*:*:*:*

Patches

1
860cad9e02ba

Fix crash on Tunnel-Password attributes with zero length

https://github.com/alandekok/freeradius-serverAlan T. DeKokSep 7, 2009via nvd-ref
1 file changed · +6 0
  • src/lib/radius.c+6 0 modified
    @@ -1964,6 +1964,11 @@ int rad_decode(RADIUS_PACKET *packet, RADIUS_PACKET *original,
     		 *	over-ride this one.
     		 */
     	create_pair:
    +		/*
    +		 *	Ignore VSAs that have no data.
    +		 */
    +		if (attrlen == 0) goto next;
    +
     		pair = rad_attr2vp(packet, original, secret,
     				 attribute, attrlen, ptr);
     		if (!pair) {
    @@ -1976,6 +1981,7 @@ int rad_decode(RADIUS_PACKET *packet, RADIUS_PACKET *original,
     		*tail = pair;
     		tail = &pair->next;
     
    +	next:
     		ptr += attrlen;
     		packet_length -= attrlen;
     	}
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

13

News mentions

0

No linked articles in our index yet.