CentOS 3 / 4 : freeradius (CESA-2005:524)

high Nessus Plugin ID 21837

Synopsis

The remote CentOS host is missing one or more security updates.

Description

Updated freeradius packages that fix a buffer overflow and possible SQL injection attacks in the sql module are now available.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

FreeRADIUS is a high-performance and highly configurable free RADIUS server designed to allow centralized authentication and authorization for a network.

A buffer overflow bug was found in the way FreeRADIUS escapes data in a SQL query. An attacker may be able to crash FreeRADIUS if they cause FreeRADIUS to escape a string containing three or less characters. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-1454 to this issue.

Additionally a bug was found in the way FreeRADIUS escapes SQL data.
It is possible that an authenticated user could execute arbitrary SQL queries by sending a specially crafted request to FreeRADIUS. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-1455 to this issue.

Users of FreeRADIUS should update to these erratum packages, which contain backported patches and are not vulnerable to these issues.

Solution

Update the affected freeradius packages.

See Also

http://www.nessus.org/u?a07e7fac

http://www.nessus.org/u?2f159ba5

http://www.nessus.org/u?af79e8ec

http://www.nessus.org/u?f54d5ca3

http://www.nessus.org/u?aa5b56be

http://www.nessus.org/u?7568b3a4

Plugin Details

Severity: High

ID: 21837

File Name: centos_RHSA-2005-524.nasl

Version: 1.20

Type: local

Agent: unix

Published: 7/3/2006

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:centos:centos:3, p-cpe:/a:centos:centos:freeradius-postgresql, p-cpe:/a:centos:centos:freeradius-mysql, cpe:/o:centos:centos:4, p-cpe:/a:centos:centos:freeradius, p-cpe:/a:centos:centos:freeradius-unixodbc

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Patch Publication Date: 6/23/2005

Vulnerability Publication Date: 5/19/2005

Reference Information

CVE: CVE-2005-1454, CVE-2005-1455

RHSA: 2005:524