blob: 7c630928e11f19b8fd0085bb9818953071d84abd [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200505-13">
<title>FreeRADIUS: SQL injection and Denial of Service vulnerability</title>
The FreeRADIUS server is vulnerable to an SQL injection attack and a buffer
overflow, possibly resulting in disclosure and modification of data and
Denial of Service.
<product type="ebuild">freeradius</product>
<announced>May 17, 2005</announced>
<revised>May 22, 2006: 03</revised>
<package name="net-dialup/freeradius" auto="yes" arch="*">
<unaffected range="ge">1.0.2-r4</unaffected>
<vulnerable range="lt">1.0.2-r4</vulnerable>
FreeRADIUS is an open source RADIUS authentication server
Primoz Bratanic discovered that the sql_escape_func function of
FreeRADIUS may be vulnerable to a buffer overflow (BID 13541). He also
discovered that FreeRADIUS fails to sanitize user-input before using it
in a SQL query, possibly allowing SQL command injection (BID 13540).
<impact type="normal">
By supplying carefully crafted input, a malicious user could cause an
SQL injection or a buffer overflow, possibly leading to the disclosure
and the modification of sensitive data or Denial of Service by crashing
the server.
There are no known workarounds at this time.
All FreeRADIUS users should upgrade to the latest available version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-dialup/freeradius-1.0.2-r4&quot;</code>
<uri link="">BugTraq ID 13540</uri>
<uri link="">BugTraq ID 13541</uri>
<uri link="">CVE-2005-1454</uri>
<uri link="">CVE-2005-1455</uri>
<metadata tag="requester" timestamp="Thu, 12 May 2005 12:54:33 +0000">
<metadata tag="submitter" timestamp="Thu, 12 May 2005 13:46:19 +0000">
<metadata tag="bugReady" timestamp="Tue, 17 May 2005 13:01:45 +0000">