CVE-2005-1455
CVSS7.5
发布时间 :2005-05-19 00:00:00
修订时间 :2010-08-21 00:28:53
NMCOS    

[原文]Buffer overflow in the sql_escape_func function in the SQL module for FreeRADIUS 1.0.2 and earlier allows remote attackers to cause a denial of service (crash).


[CNNVD]FreeRadius RLM_SQL.C缓冲区溢出漏洞(CNNVD-200505-1127)

        FreeRADIUS 1.0.2及更早版本的SQL模块中的sql_escape_func函数存在缓冲区溢出,远程攻击者可以发起拒绝服务攻击(崩溃)。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:9579Buffer overflow in the sql_escape_func function in the SQL module for FreeRADIUS 1.0.2 and earlier allows remote attackers to cause a denial...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1455
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1455
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-1127
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/13541
(PATCH)  BID  13541
http://www.gentoo.org/security/en/glsa/glsa-200505-13.xml
(PATCH)  GENTOO  GLSA-200505-13
http://xforce.iss.net/xforce/xfdb/20450
(UNKNOWN)  XF  freeradius-sqlescapefunc-bo(20450)
http://www.securitytracker.com/alerts/2005/May/1013909.html
(UNKNOWN)  SECTRACK  1013909
http://www.novell.com/linux/security/advisories/2005_14_sr.html
(UNKNOWN)  SUSE  SUSE-SR:2005:014
http://www.freeradius.org/security.html
(UNKNOWN)  CONFIRM  http://www.freeradius.org/security.html
http://www.derkeiler.com/Mailing-Lists/Full-Disclosure/2005-05/0492.html
(UNKNOWN)  FULLDISC  20050520 ERRATA: [ GLSA 200505-13 ] FreeRADIUS: SQL injection and Denial of Service vulnerability
http://www.redhat.com/support/errata/RHSA-2005-524.html
(UNKNOWN)  REDHAT  RHSA-2005:524

- 漏洞信息

FreeRadius RLM_SQL.C缓冲区溢出漏洞
高危 缓冲区溢出
2005-05-19 00:00:00 2005-10-20 00:00:00
远程  
        FreeRADIUS 1.0.2及更早版本的SQL模块中的sql_escape_func函数存在缓冲区溢出,远程攻击者可以发起拒绝服务攻击(崩溃)。

- 公告与补丁

        暂无数据

- 漏洞信息

16456
FreeRADIUS rlm_sql.c sql_escape_func Function Overflow
Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-05-01 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

FreeRadius RLM_SQL.C Buffer Overflow Vulnerability
Boundary Condition Error 13541
Yes No
2005-05-06 12:00:00 2009-07-12 02:06:00
Primoz Bratanic is credited with the discovery of this vulnerability.

- 受影响的程序版本

SuSE SUSE Linux Enterprise Server 8
+ Linux kernel 2.4.21
+ Linux kernel 2.4.19
SuSE SUSE Linux Enterprise Server 7
+ Linux kernel 2.4.19
SGI ProPack 3.0 SP5
S.u.S.E. SuSE Linux School Server for i386
S.u.S.E. SuSE eMail Server III
S.u.S.E. SuSE eMail Server 3.1
S.u.S.E. Open-Enterprise-Server 9.0
S.u.S.E. Novell Linux Desktop 9.0
S.u.S.E. Novell Linux Desktop 1.0
S.u.S.E. Linux Professional 8.2
S.u.S.E. Linux Professional 7.3
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 9.2 x86_64
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1 x86_64
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 9.0 x86_64
S.u.S.E. Linux Personal 9.0
S.u.S.E. Linux Personal 8.2
S.u.S.E. Linux Openexchange Server
S.u.S.E. Linux Office Server
S.u.S.E. Linux IMAP Server 1.0
S.u.S.E. Linux Enterprise Server for S/390 9.0
S.u.S.E. Linux Enterprise Server for S/390
S.u.S.E. Linux Enterprise Server 9
S.u.S.E. Linux Desktop 1.0
S.u.S.E. Linux Database Server 0
S.u.S.E. Linux Connectivity Server
S.u.S.E. Linux 8.1
S.u.S.E. Linux 8.0 i386
S.u.S.E. Linux 8.0
S.u.S.E. Linux 7.3 sparc
S.u.S.E. Linux 7.3 ppc
S.u.S.E. Linux 7.3 i386
S.u.S.E. Linux 7.3
S.u.S.E. Linux 7.2 i386
S.u.S.E. Linux 7.2
S.u.S.E. Linux 7.1 x86
S.u.S.E. Linux 7.1 sparc
S.u.S.E. Linux 7.1 ppc
S.u.S.E. Linux 7.1 alpha
S.u.S.E. Linux 7.1
S.u.S.E. Linux 7.0 sparc
S.u.S.E. Linux 7.0 ppc
S.u.S.E. Linux 7.0 i386
S.u.S.E. Linux 7.0 alpha
S.u.S.E. Linux 7.0
S.u.S.E. Linux 6.4 ppc
S.u.S.E. Linux 6.4 i386
S.u.S.E. Linux 6.4 alpha
S.u.S.E. Linux 6.4
S.u.S.E. Linux 6.3 ppc
S.u.S.E. Linux 6.3 alpha
S.u.S.E. Linux 6.3
S.u.S.E. Linux 6.2
S.u.S.E. Linux 6.1 alpha
S.u.S.E. Linux 6.1
S.u.S.E. Linux 6.0
S.u.S.E. Linux 5.3
S.u.S.E. Linux 5.2
S.u.S.E. Linux 5.1
S.u.S.E. Linux 5.0
S.u.S.E. Linux 4.4.1
S.u.S.E. Linux 4.4
S.u.S.E. Linux 4.3
S.u.S.E. Linux 4.2
S.u.S.E. Linux 4.0
S.u.S.E. Linux 3.0
S.u.S.E. Linux 2.0
S.u.S.E. Linux 1.0
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux ES 3
Red Hat Fedora Core3
Red Hat Enterprise Linux AS 4
Red Hat Enterprise Linux AS 3
FreeRADIUS FreeRADIUS 1.0.2
+ Gentoo Linux
FreeRADIUS FreeRADIUS 1.0.3

- 不受影响的程序版本

FreeRADIUS FreeRADIUS 1.0.3

- 漏洞讨论

FreeRadius is prone to a buffer overflow vulnerability. This issue is due to a failure in the application to do proper bounds checking on user-supplied data.

Remote code execution may be possible; this has not been confirmed.

Reportedly, this issue may only result in a denial of service condition and does not allow attackers to gain unauthorized remote access.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

The vendor released an update to address this issue on 03 June, 2005.

SGI has released advisory 20050606-01-U to address this, and other issues for SGI ProPack 3 Service Pack 5. Please see the referenced advisory for further information.

Debian has released updated packages to address this issue. These packages may be applied using the 'apt-get' utility.

Gentoo has released advisory GLSA 200505-13 to address this issue. Please see the referenced advisory for more information. Gentoo users may carry out the following commands to update their computers:

emerge --sync
emerge --ask --oneshot --verbose ">=net-dialup/freeradius-1.0.2-r3"

SUSE Linux has released advisory SUSE-SR:2005:014 to address this and other issues. Please see the referenced advisory for more information.

RedHat has released advisory RHSA-2005:524-05 and fixes for Enterprise Linux. Please see the referenced advisory for links to fixes.

Fedora advisory FEDORA-2005-807 is available to address this issue in Fedora Core 3.


FreeRADIUS FreeRADIUS 1.0.2

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站