Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200612-17] GNU Radius: Format string vulnerability


Vulnerability Assessment Details

[GLSA-200612-17] GNU Radius: Format string vulnerability

Vulnerability Assessment Summary
GNU Radius: Format string vulnerability

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200612-17
(GNU Radius: Format string vulnerability)


A format string vulnerability was found in the sqllog function from the
SQL accounting code for radiusd. That function is only used if one or
more of the "postgresql", "mysql" or "odbc" USE flags are enabled,
which is not the default, except for the "server" 2006.1 and 2007.0
profiles which enable the "mysql" USE flag.

Impact

An unauthenticated remote attacker could execute arbitrary code with
the rights of the user running radiusd, which may be the root user.
It is important to note that there is no default GNU Radius user for
Gentoo systems because no init script is provided with the package.

Workaround

There is no known workaround at this time.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4181


Solution:
All GNU Radius users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-dialup/gnuradius-1.4"


Network Security Threat Level: High


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2006 Michel Arboi

Cables, Connectors

lntel CORE 2 QUAD Q6600 Processor 2.4GHz/8MB /Quad-Core/FSB
$11.0
lntel CORE 2 QUAD Q6600 Processor 2.4GHz/8MB /Quad-Core/FSB pictureNew cooler for HP G62 G72 cooling heatsink with fan 612355-001 for AMD cpu DSC
$32.0
New cooler for HP G62 G72 cooling heatsink with fan 612355-001 for AMD cpu DSC pictureTyan Titan 2 Motherboard with Pentium 90 CPU + RAM
$40.0
Tyan Titan 2 Motherboard with Pentium 90 CPU + RAM pictureIntel Core i7-7700K Kaby Lake Quad-Core 4.2 GHz LGA 1151 91W Desktop Processor
$295.0
Intel Core i7-7700K Kaby Lake Quad-Core 4.2 GHz LGA 1151 91W Desktop Processor picture


Discussions

No Discussions have been posted on this vulnerability.