Gentoo Logo

FreeRADIUS: SQL injection and Denial of Service vulnerability

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200505-13 / freeradius
Release Date May 17, 2005
Latest Revision May 22, 2006: 03
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
net-dialup/freeradius < 1.0.2-r4 >= 1.0.2-r4 All supported architectures

Related bugreports: #91736

Synopsis

The FreeRADIUS server is vulnerable to an SQL injection attack and a buffer overflow, possibly resulting in disclosure and modification of data and Denial of Service.

2.  Impact Information

Background

FreeRADIUS is an open source RADIUS authentication server implementation.

Description

Primoz Bratanic discovered that the sql_escape_func function of FreeRADIUS may be vulnerable to a buffer overflow (BID 13541). He also discovered that FreeRADIUS fails to sanitize user-input before using it in a SQL query, possibly allowing SQL command injection (BID 13540).

Impact

By supplying carefully crafted input, a malicious user could cause an SQL injection or a buffer overflow, possibly leading to the disclosure and the modification of sensitive data or Denial of Service by crashing the server.

3.  Resolution Information

Workaround

There are no known workarounds at this time.

Resolution

All FreeRADIUS users should upgrade to the latest available version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-dialup/freeradius-1.0.2-r4"

4.  References



Print

Page updated May 17, 2005

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.