Debian: radiusd-cistron buffer overflow vulnerability

    Date16 Jun 2003
    Posted ByLinuxSecurity Advisories
    radiusd-cistron contains a bug allowing a buffer overflow when a long NAS-Port attribute is received.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 321-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Matt Zimmerman
    June 13th, 2003                
    - --------------------------------------------------------------------------
    Package        : radiusd-cistron
    Vulnerability  : buffer overflow
    Problem-Type   : remote
    Debian-specific: no
    radiusd-cistron contains a bug allowing a buffer overflow when a long
    NAS-Port attribute is received.  This could allow a remote attacker to
    execute arbitrary code on the with the privileges of the RADIUS daemon
    (usually root).
    For the stable distribution (woody) this problem has been fixed in
    version 1.6.6-1woody1.
    For the old stable distribution (potato), this problem will be fixed
    in a later advisory.
    For the unstable distribution (sid) this problem will be fixed soon.
    We recommend that you update your radiusd-cistron package.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      611 b6a3c69ca08b1f6984147e64f7ddcaab
          Size/MD5 checksum:     4221 ad563e14d3f3da713973cd23e97dcef5
          Size/MD5 checksum:   194154 16084870890fd2ec577dbe183b51a379
      Alpha architecture:
          Size/MD5 checksum:   262652 b541753d08f0d124a9f48133eeac381e
      ARM architecture:
          Size/MD5 checksum:   235578 6277971c73bf52c22b5623f9131a8d9f
      Intel IA-32 architecture:
          Size/MD5 checksum:   231960 9ca72ec922c0fd80e22d05a06176b265
      Intel IA-64 architecture:
          Size/MD5 checksum:   365566 ea7299686e6629039ecdf81abdebd5ee
      HP Precision architecture:
          Size/MD5 checksum:   235502 886c9f6006c80dcf3c4c5305c76411b7
      Motorola 680x0 architecture:
          Size/MD5 checksum:   225678 39c53545d15bb167550fd462a139fc35
      Big endian MIPS architecture:
          Size/MD5 checksum:   246130 3d98988fb2128bc26735c1c5b7a41cde
      Little endian MIPS architecture:
          Size/MD5 checksum:   245672 88e63e2d94973aa7e65176b81184ed80
      PowerPC architecture:
          Size/MD5 checksum:   229238 eb1d0a109bb66e3d39c902f561779afc
      IBM S/390 architecture:
          Size/MD5 checksum:   238530 396c1a07cc893b3d77a1ecfcbc0ee57a
      Sun Sparc architecture:
          Size/MD5 checksum:   248882 0e39dd1a1310e1afedc4d39e2b8d2794
    These files will probably be moved into the stable distribution on its
    next revision.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"39","type":"x","order":"1","pct":50,"resources":[]},{"id":"88","title":"Should be more technical","votes":"11","type":"x","order":"2","pct":14.1,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"28","type":"x","order":"3","pct":35.9,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.