GLSA Advocate
![Advocate Advocate](/images/ranks/rank-G-1-advocate.gif)
Joined: 12 May 2004 Posts: 2663
|
Posted: Tue May 17, 2005 2:54 pm Post subject: [ GLSA 200505-13 ] FreeRADIUS: SQL injection and Denial of S |
|
|
Gentoo Linux Security Advisory
Title: FreeRADIUS: SQL injection and Denial of Service vulnerability (GLSA 200505-13)
Severity: normal
Exploitable: remote
Date: May 17, 2005
Updated: May 22, 2006
Bug(s): #91736
ID: 200505-13
Synopsis
The FreeRADIUS server is vulnerable to an SQL injection attack and a buffer
overflow, possibly resulting in disclosure and modification of data and
Denial of Service.
Background
FreeRADIUS is an open source RADIUS authentication server
implementation.
Affected Packages
Package: net-dialup/freeradius
Vulnerable: < 1.0.2-r4
Unaffected: >= 1.0.2-r4
Architectures: All supported architectures
Description
Primoz Bratanic discovered that the sql_escape_func function of
FreeRADIUS may be vulnerable to a buffer overflow (BID 13541). He also
discovered that FreeRADIUS fails to sanitize user-input before using it
in a SQL query, possibly allowing SQL command injection (BID 13540).
Impact
By supplying carefully crafted input, a malicious user could cause an
SQL injection or a buffer overflow, possibly leading to the disclosure
and the modification of sensitive data or Denial of Service by crashing
the server.
Workaround
There are no known workarounds at this time.
Resolution
All FreeRADIUS users should upgrade to the latest available version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=net-dialup/freeradius-1.0.2-r4" |
References
BugTraq ID 13540
BugTraq ID 13541
CVE-2005-1454
CVE-2005-1455
Last edited by GLSA on Mon Apr 23, 2012 4:19 am; edited 4 times in total |
|