|
Family: Debian Local Security Checks --> Category: infos
[DSA321] DSA-321-1 radiusd-cistron Vulnerability Scan
Vulnerability Scan Summary DSA-321-1 radiusd-cistron
Detailed Explanation for this Vulnerability Test
radiusd-cistron contains a bug allowing a buffer overflow when a long
NAS-Port attribute is received. This could allow a remote attacker to
execute arbitrary code on the server with the rights of the RADIUS daemon
(usually root).
For the stable distribution (woody) this problem has been fixed in
version 1.6.6-1woody1.
For the old stable distribution (potato), this problem will be fixed
in a later advisory.
For the unstable distribution (sid) this problem will be fixed soon.
We recommend that you update your radiusd-cistron package.
Solution : http://www.debian.org/security/2003/dsa-321
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|