Vulnerabilities > CVE-2006-4181 - Remote Format String vulnerability in GNU Radius SQLLog
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Format string vulnerability in the sqllog function in the SQL accounting code for radiusd in GNU Radius 1.2 and 1.3 allows remote attackers to execute arbitrary code via unknown vectors. This vulnerability is addressed in the following product release: GNU, Radius, 1.4
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-200612-17.NASL |
description | The remote host is affected by the vulnerability described in GLSA-200612-17 (GNU Radius: Format string vulnerability) A format string vulnerability was found in the sqllog function from the SQL accounting code for radiusd. That function is only used if one or more of the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 23874 |
published | 2006-12-16 |
reporter | This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/23874 |
title | GLSA-200612-17 : GNU Radius: Format string vulnerability |
code |
|
Statements
contributor | Joshua Bressers |
lastmodified | 2006-12-04 |
organization | Red Hat |
statement | Not Vulnerable. Red Hat does not ship GNU Radius in Red Hat Enterprise Linux 2.1, 3, or 4. |
References
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=443
- http://secunia.com/advisories/23087
- http://security.gentoo.org/glsa/glsa-200612-17.xml
- http://securitytracker.com/id?1017285
- http://www.securityfocus.com/bid/21303
- http://www.vupen.com/english/advisories/2006/4712
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30508