Lucene search

K
gentooGentoo FoundationGLSA-200505-13
HistoryMay 17, 2005 - 12:00 a.m.

FreeRADIUS: SQL injection and Denial of Service vulnerability

2005-05-1700:00:00
Gentoo Foundation
security.gentoo.org
22

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.005

Percentile

75.5%

Background

FreeRADIUS is an open source RADIUS authentication server implementation.

Description

Primoz Bratanic discovered that the sql_escape_func function of FreeRADIUS may be vulnerable to a buffer overflow (BID 13541). He also discovered that FreeRADIUS fails to sanitize user-input before using it in a SQL query, possibly allowing SQL command injection (BID 13540).

Impact

By supplying carefully crafted input, a malicious user could cause an SQL injection or a buffer overflow, possibly leading to the disclosure and the modification of sensitive data or Denial of Service by crashing the server.

Workaround

There are no known workarounds at this time.

Resolution

All FreeRADIUS users should upgrade to the latest available version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-dialup/freeradius-1.0.2-r4"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-dialup/freeradius< 1.0.2-r4UNKNOWN

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.005

Percentile

75.5%