Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200612-17] GNU Radius: Format string vulnerability


Vulnerability Assessment Details

[GLSA-200612-17] GNU Radius: Format string vulnerability

Vulnerability Assessment Summary
GNU Radius: Format string vulnerability

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200612-17
(GNU Radius: Format string vulnerability)


A format string vulnerability was found in the sqllog function from the
SQL accounting code for radiusd. That function is only used if one or
more of the "postgresql", "mysql" or "odbc" USE flags are enabled,
which is not the default, except for the "server" 2006.1 and 2007.0
profiles which enable the "mysql" USE flag.

Impact

An unauthenticated remote attacker could execute arbitrary code with
the rights of the user running radiusd, which may be the root user.
It is important to note that there is no default GNU Radius user for
Gentoo systems because no init script is provided with the package.

Workaround

There is no known workaround at this time.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4181


Solution:
All GNU Radius users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-dialup/gnuradius-1.4"


Network Security Threat Level: High


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2006 Michel Arboi

Cables, Connectors


Vintage Apple Macintosh SE Case - Empty Shell - Housing retro project picture

Vintage Apple Macintosh SE Case - Empty Shell - Housing retro project

$60.00



Socket 3 VLB/ISA/PCI Motherboard, FIC 486-VIP-IO2, 486DX4-100 + 4mb Vintage picture

Socket 3 VLB/ISA/PCI Motherboard, FIC 486-VIP-IO2, 486DX4-100 + 4mb Vintage

$199.99



Vintage 1980s IBM PC Jr Model 4860 Desktop Tower Computer W/2 EXPANSIONS picture

Vintage 1980s IBM PC Jr Model 4860 Desktop Tower Computer W/2 EXPANSIONS

$100.00



Socket 3 VLB/ISA/PCI Motherboard, PCPartner OPTI 486 VIP, 486DX2-66+4mb Vintage picture

Socket 3 VLB/ISA/PCI Motherboard, PCPartner OPTI 486 VIP, 486DX2-66+4mb Vintage

$199.99



Computer Lab International 122 Key Vintage Keyboard PS/2 TESTED picture

Computer Lab International 122 Key Vintage Keyboard PS/2 TESTED

$88.88



Vintage CARDCO Vic-20 C64 +4 C16 and C128 Parallel Printer Interface Card - QTY picture

Vintage CARDCO Vic-20 C64 +4 C16 and C128 Parallel Printer Interface Card - QTY

$19.99



(5) Vintage DiskBank floppy Disk Storage Holders    Vintage picture

(5) Vintage DiskBank floppy Disk Storage Holders Vintage

$29.95



Vintage 1991 Hewlett Packard  DeskJet 500 Printer Manual Bundle W Floppy Disk picture

Vintage 1991 Hewlett Packard DeskJet 500 Printer Manual Bundle W Floppy Disk

$23.99



Vintage 1989 Macintosh Adobe Type Manager User Guide picture

Vintage 1989 Macintosh Adobe Type Manager User Guide

$30.00



Vintage 1986 IBM 1389262 Model M buckling spring terminal keyboard -1 keycap picture

Vintage 1986 IBM 1389262 Model M buckling spring terminal keyboard -1 keycap

$150.00



Discussions

No Discussions have been posted on this vulnerability.