|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200505-13] FreeRADIUS: SQL injection and Denial of Service vulnerability Vulnerability Scan
Vulnerability Scan Summary FreeRADIUS: SQL injection and Denial of Service vulnerability
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200505-13
(FreeRADIUS: SQL injection and Denial of Service vulnerability)
Primoz Bratanic discovered that the sql_escape_func function of
FreeRADIUS may be vulnerable to a buffer overflow (BID 13541). He also
discovered that FreeRADIUS fails to sanitize user-input before using it
in a SQL query, possibly allowing SQL command injection (BID 13540).
Impact
By supplying carefully crafted input, a malicious user could cause an
SQL injection or a buffer overflow, possibly leading to the disclosure
and the modification of sensitive data or Denial of Service by crashing
the server.
Workaround
There are no known workarounds at this time.
References:
http://www.securityfocus.com/bid/13540/
http://www.securityfocus.com/bid/13541/
Solution:
All FreeRADIUS users should upgrade to the latest available version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-dialup/freeradius-1.0.2-r4"
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.
|