Vulnerabilities > CVE-2003-0450 - Unspecified vulnerability in Cistron Radius Daemon
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN cistron
nessus
Summary
Cistron RADIUS daemon (radiusd-cistron) 1.6.6 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large value in an NAS-Port attribute, which is interpreted as a negative number and causes a buffer overflow.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DSA-321.NASL |
description | radiusd-cistron contains a bug allowing a buffer overflow when a long NAS-Port attribute is received. This could allow a remote attacker to execute arbitrary code on the server with the privileges of the RADIUS daemon (usually root). |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 15158 |
published | 2004-09-29 |
reporter | This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/15158 |
title | Debian DSA-321-1 : radiusd-cistron - buffer overflow |
code |
|
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=196063
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=196063
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000664
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000664
- http://www.debian.org/security/2003/dsa-321
- http://www.debian.org/security/2003/dsa-321
- http://www.novell.com/linux/security/advisories/2003_030_radiusd_cistron.html
- http://www.novell.com/linux/security/advisories/2003_030_radiusd_cistron.html
- http://www.turbolinux.com/security/TLSA-2003-40.txt
- http://www.turbolinux.com/security/TLSA-2003-40.txt