Lucene search

K
suseSuseSUSE-SA:2002:013
HistoryApr 29, 2002 - 12:26 p.m.

remote command execution in radiusd-cistron

2002-04-2912:26:05
lists.opensuse.org
13

0.037 Low

EPSS

Percentile

90.7%

The radius daemon as shipped with the radiusd-cistron package is responsible for the RADIUS authentication service in networks and therefore considered a security critical application. ZARAZA reported security releated bugs in various radius server and client software. The list of vulnerable servers includes the cistron radius package. Within the cistron package, a buffer overflow in the digest calculation function and miscalculations of attribute lengths have been fixed which could allow remote attackers to execute arbitrary commands on the system running the radius server. Beside the cistron radius package the following radius packages have been vulnerable to the same attacks and have been fixed: freeradius, radiusclient and livingston-radius. The only workaround for this bug is to disable the radius-server until the new packages have been installed.

0.037 Low

EPSS

Percentile

90.7%

Related for SUSE-SA:2002:013