Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 24005 - net-dialup/cistronradius
Summary: net-dialup/cistronradius
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: New packages (show other bugs)
Hardware: All Linux
: Highest critical
Assignee: Gentoo Security
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2003-07-06 13:56 UTC by Daniel Ahlberg (RETIRED)
Modified: 2003-07-11 07:45 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Daniel Ahlberg (RETIRED) gentoo-dev 2003-07-06 13:56:17 UTC
-------------------------------------------------------------------------- 
CONECTIVA LINUX SECURITY ANNOUNCEMENT 
-------------------------------------------------------------------------- 
 
PACKAGE   : radiusd-cistron 
SUMMARY   : Buffer overflow vulnerability 
DATE      : 2003-06-27 12:07:00 
ID        : CLA-2003:664 
RELEVANT 
RELEASES  : 7.0, 8, 9 
 
------------------------------------------------------------------------- 
 
DESCRIPTION 
 Cistron RADIUS is an authentication and accounting system for 
 terminal servers that speak the RADIUS (Remote Authentication Dial In 
 User Service) protocol. 
 
 David Luyer reported[1] a buffer overflow vulnerability in 
 radiusd-cistron versions <= 1.6.6 that could allow remote attackers 
 to cause a denial of service (DoS) and possibly execute arbitrary 
 code in the server context. The vulnerability resides in the handling 
 of the NAS-Port attribute, which can be interpreted as a negative 
 number, causing a buffer overflow. 
 
 The Common Vulnerabilities and Exposures (CVE) project has assigned 
 the name CAN-2003-0450 to this issue[2]. 
 
 This update fixes the problem using a patched version of 
 radiusd-cistron 1.6.6. 
 
 
SOLUTION 
 All radius-cistron users should upgrade. This update will 
 automatically restart the service if it is already running. 
 
 
 REFERENCES: 
 1.http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=196063 
 2.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0450 
 3.http://distro2.conectiva.com.br/bugzilla/show_bug.cgi?id=8690
Comment 1 Daniel Ahlberg (RETIRED) gentoo-dev 2003-07-11 07:45:16 UTC
glsa sent