CVE-2005-4745
CVSS7.5
发布时间 :2005-12-31 00:00:00
修订时间 :2010-04-02 02:30:18
NMCOPS    

[原文]SQL injection vulnerability in the rlm_sqlcounter module in FreeRADIUS 1.0.3 and 1.0.4 allows remote attackers to execute arbitrary SQL commands via unknown attack vectors.


[CNNVD]FreeRadius RLM_SQLCounter SQL注入漏洞(CNNVD-200512-633)

        FreeRADIUS 1.0.3和1.0.4版本中的rlm_sqlcounter模块存在SQL注入漏洞,远程攻击者可以通过未知攻击向量执行任意SQL命令。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:freeradius:freeradius:1.0.3FreeRADIUS 1.0.3
cpe:/a:freeradius:freeradius:1.0.4FreeRADIUS 1.0.4

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4745
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-4745
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200512-633
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/17294
(UNKNOWN)  BID  17294
http://www.osvdb.org/19323
(UNKNOWN)  OSVDB  19323
http://www.freeradius.org/security.html
(UNKNOWN)  CONFIRM  http://www.freeradius.org/security.html
http://www.mandriva.com/security/advisories?name=MDKSA-2007:092
(UNKNOWN)  MANDRIVA  MDKSA-2007:092
http://www.debian.org/security/2006/dsa-1145
(UNKNOWN)  DEBIAN  DSA-1145

- 漏洞信息

FreeRadius RLM_SQLCounter SQL注入漏洞
高危 SQL注入
2005-12-31 00:00:00 2006-04-07 00:00:00
远程  
        FreeRADIUS 1.0.3和1.0.4版本中的rlm_sqlcounter模块存在SQL注入漏洞,远程攻击者可以通过未知攻击向量执行任意SQL命令。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
        ftp://ftp.freeradius.org/pub/radius/freeradius-1.1.1.tar.gz
        http://www.mandriva.com/en/download

- 漏洞信息 (F56185)

Mandriva Linux Security Advisory 2007.092 (PacketStormID:F56185)
2007-04-24 00:00:00
Mandriva  mandriva.com
advisory,remote,overflow,arbitrary,sql injection
linux,mandriva
CVE-2005-4746,CVE-2005-4745
[点击下载]

Mandriva Linux Security Advisory - Multiple buffer overflows were found in the FreeRADIUS package version 1.0.4 and prior that could allow a remote attacker to cause a crash via the rlm_sqlcounter module. As well, an SQL injection vulnerability was also found in the rlm_sqlcounter that could allow a remote attacker to execute arbitrary SQL commands via unknown attack vectors.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2007:092
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : freeradius
 Date    : April 23, 2007
 Affected: Corporate 4.0
 _______________________________________________________________________
 
 Problem Description:
 
 Multiple buffer overflows were found in the FreeRADIUS package version
 1.0.4 and prior that could allow a remote attacker to cause a crash
 via the rlm_sqlcounter module (CVE-2005-4746).
 
 As well, an SQL injection vulnerability was also found in the
 rlm_sqlcounter that could allow a remote attacker to execute arbitrary
 SQL commands via unknown attack vectors (CVE-2005-4745).
 
 Updated packages have been patched to correct this issue.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4745
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4746
 _______________________________________________________________________
 
 Updated Packages:
 
 Corporate 4.0:
 523055be4399355565d6175d7df13ca7  corporate/4.0/i586/freeradius-1.0.4-2.4.20060mlcs4.i586.rpm
 4e000a3cb2c8cb2f3359a961878a310a  corporate/4.0/i586/libfreeradius1-1.0.4-2.4.20060mlcs4.i586.rpm
 3e9f17beada7d6d10235c6db8156a77a  corporate/4.0/i586/libfreeradius1-devel-1.0.4-2.4.20060mlcs4.i586.rpm
 0429cf3dda93772e358fc34a1d5cb1f8  corporate/4.0/i586/libfreeradius1-krb5-1.0.4-2.4.20060mlcs4.i586.rpm
 216c28ffac0b1d03a493d5548556be2d  corporate/4.0/i586/libfreeradius1-ldap-1.0.4-2.4.20060mlcs4.i586.rpm
 07ebd1dbb7d4f1a71253ebab163f1dd8  corporate/4.0/i586/libfreeradius1-mysql-1.0.4-2.4.20060mlcs4.i586.rpm
 9b3586d1c94b6cf650723a095db846d7  corporate/4.0/i586/libfreeradius1-postgresql-1.0.4-2.4.20060mlcs4.i586.rpm
 10b8fb70adfc1a641b2f63c041db1069  corporate/4.0/i586/libfreeradius1-unixODBC-1.0.4-2.4.20060mlcs4.i586.rpm 
 0fb72186b61687df8dedff8d874fbb86  corporate/4.0/SRPMS/freeradius-1.0.4-2.4.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 435d07e3a5878cb0fd27e02fbee702df  corporate/4.0/x86_64/freeradius-1.0.4-2.4.20060mlcs4.x86_64.rpm
 f57c46977fbd86772852f21d138605de  corporate/4.0/x86_64/lib64freeradius1-1.0.4-2.4.20060mlcs4.x86_64.rpm
 bcc4dc4cac18ed3d034483de311fe240  corporate/4.0/x86_64/lib64freeradius1-devel-1.0.4-2.4.20060mlcs4.x86_64.rpm
 646309915542dad2b6e68ff130fead11  corporate/4.0/x86_64/lib64freeradius1-krb5-1.0.4-2.4.20060mlcs4.x86_64.rpm
 039290c0f429ff9f5ecf1ce13b17765f  corporate/4.0/x86_64/lib64freeradius1-ldap-1.0.4-2.4.20060mlcs4.x86_64.rpm
 0ca4c838dae5657c3f902ed2234a7286  corporate/4.0/x86_64/lib64freeradius1-mysql-1.0.4-2.4.20060mlcs4.x86_64.rpm
 a48ad352690163f2fd90f022007bcd7a  corporate/4.0/x86_64/lib64freeradius1-postgresql-1.0.4-2.4.20060mlcs4.x86_64.rpm
 e8aea2d0c9a45462ef30ab0113b62164  corporate/4.0/x86_64/lib64freeradius1-unixODBC-1.0.4-2.4.20060mlcs4.x86_64.rpm 
 0fb72186b61687df8dedff8d874fbb86  corporate/4.0/SRPMS/freeradius-1.0.4-2.4.20060mlcs4.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFGLO1nmqjQ0CJFipgRAsFaAJ9co3OlDWZ/TbgBhXObcQQisfeV7wCglV83
4mS7Fi8Nr26rU13+J4dlRxM=
=UflY
-----END PGP SIGNATURE-----

    

- 漏洞信息 (F49104)

Debian Linux Security Advisory 1145-1 (PacketStormID:F49104)
2006-08-18 00:00:00
Debian  debian.org
advisory,remote,denial of service,vulnerability,sql injection
linux,debian
CVE-2005-4745,CVE-2006-4746
[点击下载]

Debian Security Advisory 1145-1 - Several remote vulnerabilities have been discovered in freeradius, a high-performance RADIUS server, which may lead to SQL injection or denial of service.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1145-1                    security@debian.org
http://www.debian.org/security/                         Moritz Muehlenhoff
August 8th, 2006                        http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : freeradius
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE ID         : CVE-2005-4745 CVE-2005-4746

Several remote vulnerabilities have been discovered in freeradius, a
high-performance RADIUS server, which may lead to SQL injection or denial
of service. The Common Vulnerabilities and Exposures project identifies
the following problems:

CVE-2005-4745

    An SQL injection vulnerability has been discovered in the
    rlm_sqlcounter module.

CVE-2006-4746

    Multiple buffer overflows have been discovered, allowing denial of
    service.

For the stable distribution (sarge) these problems have been fixed in
version 1.0.2-4sarge3.

For the unstable distribution (sid) these problems have been fixed in
version 1.0.5-1.

We recommend that you upgrade your freeradius packages.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/f/freeradius/freeradius_1.0.2-4sarge3.dsc
      Size/MD5 checksum:      897 9da78722cf4e8de073f21a0c4a4a5a52
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius_1.0.2-4sarge3.diff.gz
      Size/MD5 checksum:    17220 e510f92d9152f41801312941409d35ce
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius_1.0.2.orig.tar.gz
      Size/MD5 checksum:  1931715 422a004f2354b2a7364f5b683891a26a

  Architecture independent components:

    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-dialupadmin_1.0.2-4sarge3_all.deb
      Size/MD5 checksum:   111760 02a048b89f5d5bb78f07439de08975b1

  Alpha architecture:

    http://security.debian.org/pool/updates/main/f/freeradius/freeradius_1.0.2-4sarge3_alpha.deb
      Size/MD5 checksum:  2234974 d9208f084edcc999b51b20753ee976cd
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-iodbc_1.0.2-4sarge3_alpha.deb
      Size/MD5 checksum:    54254 fc4b23c830ae96c9f83280095d74ac90
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-krb5_1.0.2-4sarge3_alpha.deb
      Size/MD5 checksum:    55078 23212bf61a381bfbfa00a48f96ff6053
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-ldap_1.0.2-4sarge3_alpha.deb
      Size/MD5 checksum:   107548 8aaaa457b450ec1c8916340587fef3b1
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-mysql_1.0.2-4sarge3_alpha.deb
      Size/MD5 checksum:    56028 26cd188ec8106a1bc1d66ab048460a79

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/f/freeradius/freeradius_1.0.2-4sarge3_amd64.deb
      Size/MD5 checksum:  1961222 cbb024edb0d5238f989173d89d09d2f4
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-iodbc_1.0.2-4sarge3_amd64.deb
      Size/MD5 checksum:    53108 c35f1f84ae1d8ea8c577378055392f28
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-krb5_1.0.2-4sarge3_amd64.deb
      Size/MD5 checksum:    53862 00e2095e1f39ae72a5609dd76910034c
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-ldap_1.0.2-4sarge3_amd64.deb
      Size/MD5 checksum:    99668 5203b88057bbc3de03ecd87755281036
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-mysql_1.0.2-4sarge3_amd64.deb
      Size/MD5 checksum:    54836 6fd3e759651ea3fe0478547642f4259f

  ARM architecture:

    http://security.debian.org/pool/updates/main/f/freeradius/freeradius_1.0.2-4sarge3_arm.deb
      Size/MD5 checksum:  2034340 4fb67c48357f16d7be78b4fbe12587fa
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-iodbc_1.0.2-4sarge3_arm.deb
      Size/MD5 checksum:    51272 2cea05c9dc2706070f58040212b4e799
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-krb5_1.0.2-4sarge3_arm.deb
      Size/MD5 checksum:    52688 be9cb442fb0f6a90edfe70792217c725
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-ldap_1.0.2-4sarge3_arm.deb
      Size/MD5 checksum:    96464 9fc105b04bd9ac80c04c75711711f62d
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-mysql_1.0.2-4sarge3_arm.deb
      Size/MD5 checksum:    53274 4de175712a085a38a02bcff9fbe1cfbd

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/f/freeradius/freeradius_1.0.2-4sarge3_i386.deb
      Size/MD5 checksum:  2032516 249932930c67845be5d844cfabbdf431
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-iodbc_1.0.2-4sarge3_i386.deb
      Size/MD5 checksum:    51558 a24eff84d5b737755c2a910d01c8adfe
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-krb5_1.0.2-4sarge3_i386.deb
      Size/MD5 checksum:    52666 22e5ab99d223ce4a89706a503e6843a6
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-ldap_1.0.2-4sarge3_i386.deb
      Size/MD5 checksum:    97628 1c4716d249dd1d78cd0938b2319cc64c
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-mysql_1.0.2-4sarge3_i386.deb
      Size/MD5 checksum:    53400 06cd4c6ad0444000cc3334b89aa74335

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/f/freeradius/freeradius_1.0.2-4sarge3_ia64.deb
      Size/MD5 checksum:  2375540 5de9567eaf7e05d715bbcb3c3aec9daa
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-iodbc_1.0.2-4sarge3_ia64.deb
      Size/MD5 checksum:    54054 1cc25baa1f9ded198bd39d553dc4de2b
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-krb5_1.0.2-4sarge3_ia64.deb
      Size/MD5 checksum:    55240 29860799cd60b08be56a87e5adb9907a
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-ldap_1.0.2-4sarge3_ia64.deb
      Size/MD5 checksum:   112916 e58adaf4600db74d26a398a2883b8c33
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-mysql_1.0.2-4sarge3_ia64.deb
      Size/MD5 checksum:    56120 b673bda54099c764f299f2ed5b66f539

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/f/freeradius/freeradius_1.0.2-4sarge3_hppa.deb
      Size/MD5 checksum:  2039380 5d798c11b6a85057b9890f79a5021263
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-iodbc_1.0.2-4sarge3_hppa.deb
      Size/MD5 checksum:    54678 57567692624381166e5cf986a2a44fc1
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-krb5_1.0.2-4sarge3_hppa.deb
      Size/MD5 checksum:    56104 f89a83d37fd8c67ebba7f7f4a2443846
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-ldap_1.0.2-4sarge3_hppa.deb
      Size/MD5 checksum:   105536 1e2cd25a9acabe755edc90883d91d5b3
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-mysql_1.0.2-4sarge3_hppa.deb
      Size/MD5 checksum:    56442 674d4f0818c00e37c51b76ac04c68e18

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/f/freeradius/freeradius_1.0.2-4sarge3_m68k.deb
      Size/MD5 checksum:  2017794 d7896b5846dfba3e235760c63b1e9f3b
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-iodbc_1.0.2-4sarge3_m68k.deb
      Size/MD5 checksum:    53036 fe09b63d1277f04758f4f57459f9f677
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-krb5_1.0.2-4sarge3_m68k.deb
      Size/MD5 checksum:    54028 28ed1c4fc7a7e256d3aba575794f6692
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-ldap_1.0.2-4sarge3_m68k.deb
      Size/MD5 checksum:    95270 df56d263433e5fad7f26d06fcd94f734
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-mysql_1.0.2-4sarge3_m68k.deb
      Size/MD5 checksum:    54884 40cf80c983717753b090d5a8067b7710

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/f/freeradius/freeradius_1.0.2-4sarge3_mips.deb
      Size/MD5 checksum:  2135704 c4b7ae0e080900534351c35d81d26184
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-iodbc_1.0.2-4sarge3_mips.deb
      Size/MD5 checksum:    53292 a0edac9c731434e8103709ebdc8b7ace
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-krb5_1.0.2-4sarge3_mips.deb
      Size/MD5 checksum:    53758 d7d6aa5dbf5495a84d0e91561cfd7d65
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-ldap_1.0.2-4sarge3_mips.deb
      Size/MD5 checksum:    98086 eb9bd1ae3273fc85247689d2df492c07
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-mysql_1.0.2-4sarge3_mips.deb
      Size/MD5 checksum:    55236 bbd094a242c864772cbb03b96944100d

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/f/freeradius/freeradius_1.0.2-4sarge3_mipsel.deb
      Size/MD5 checksum:  2102720 b939f831e6c7034b2c79fb4c901fd747
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-iodbc_1.0.2-4sarge3_mipsel.deb
      Size/MD5 checksum:    52156 f48edaa7cfba5f3064eaee9e59076b2f
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-krb5_1.0.2-4sarge3_mipsel.deb
      Size/MD5 checksum:    52488 775b45cef3ce1022e8634bba4238b5ee
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-ldap_1.0.2-4sarge3_mipsel.deb
      Size/MD5 checksum:    96592 93366948c99a4f7b9d98444fd803c412
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-mysql_1.0.2-4sarge3_mipsel.deb
      Size/MD5 checksum:    54040 9ccca0196e836b164d6e1836d2fe323b

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/f/freeradius/freeradius_1.0.2-4sarge3_powerpc.deb
      Size/MD5 checksum:  2330454 994519f38a5e70cb3ccb32493e5f8a3a
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-iodbc_1.0.2-4sarge3_powerpc.deb
      Size/MD5 checksum:    58904 89f9e6de1d19aad2ad8643c4f350dbf4
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-krb5_1.0.2-4sarge3_powerpc.deb
      Size/MD5 checksum:    60094 8670e82842a529a33232db8baf3aa64f
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-ldap_1.0.2-4sarge3_powerpc.deb
      Size/MD5 checksum:   108932 ea331982f02062fb48f5d0b131985487
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-mysql_1.0.2-4sarge3_powerpc.deb
      Size/MD5 checksum:    61324 6b6a2716ff73561f0b976a3acda17e2e

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/f/freeradius/freeradius_1.0.2-4sarge3_s390.deb
      Size/MD5 checksum:  2581992 24c1f9195295e5e2f0712eaac726402a
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-iodbc_1.0.2-4sarge3_s390.deb
      Size/MD5 checksum:    65738 127d6d9af2c170a7636c050c687194c8
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-krb5_1.0.2-4sarge3_s390.deb
      Size/MD5 checksum:    66498 27fd6c961e29f61c0ed212ee9d42a8c2
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-ldap_1.0.2-4sarge3_s390.deb
      Size/MD5 checksum:   122844 6a5a9d8a348d221d8a5a841a246a8438
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-mysql_1.0.2-4sarge3_s390.deb
      Size/MD5 checksum:    68156 b3ed41eb64c3be68a8db5fda4dc0517e

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/f/freeradius/freeradius_1.0.2-4sarge3_sparc.deb
      Size/MD5 checksum:  2080760 3c4d953fa31e51a989ab3c398c673516
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-iodbc_1.0.2-4sarge3_sparc.deb
      Size/MD5 checksum:    52984 690d493600ec99123f98c01f4363bb2b
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-krb5_1.0.2-4sarge3_sparc.deb
      Size/MD5 checksum:    54074 e87f1fae9eab78e0445ac260e01ce002
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-ldap_1.0.2-4sarge3_sparc.deb
      Size/MD5 checksum:    98984 c9a0260f3f7610909ad11f46263e3a7e
    http://security.debian.org/pool/updates/main/f/freeradius/freeradius-mysql_1.0.2-4sarge3_sparc.deb
      Size/MD5 checksum:    54958 5778e8d3c14371b38248da1ced0b4442


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFE18xnXm3vHE4uyloRAvTjAKCTb0mVqc4VhfjROSCt9K4TIRNmvQCg1sLi
QKh4m7Br7/tlMKwuJfcMuHc=
=0w2u
-----END PGP SIGNATURE-----

    

- 漏洞信息

19323
FreeRADIUS rlm_sqlcounter Module SQL Injection
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality, Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-09-09 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 1.0.5 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

FreeRadius RLM_SQLCounter SQL Injection Vulnerability
Input Validation Error 17294
Yes No
2006-03-28 12:00:00 2007-04-26 10:40:00
Primoz Bratanic is credited with the discovery of this vulnerability.

- 受影响的程序版本

MandrakeSoft Corporate Server 4.0 x86_64
MandrakeSoft Corporate Server 4.0
FreeRADIUS FreeRADIUS 1.0.4
FreeRADIUS FreeRADIUS 1.0.3
Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 amd64
Debian Linux 3.1 alpha
Debian Linux 3.1
FreeRADIUS FreeRADIUS 1.1.1
FreeRADIUS FreeRADIUS 1.1
FreeRADIUS FreeRADIUS 1.0.5

- 不受影响的程序版本

FreeRADIUS FreeRADIUS 1.1.1
FreeRADIUS FreeRADIUS 1.1
FreeRADIUS FreeRADIUS 1.0.5

- 漏洞讨论

FreeRADIUS is prone to an SQL-injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query.

Successful exploitation could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

- 漏洞利用

An exploit is not required.

- 解决方案

The vendor released version 1.1.1 to address this issue.

Please see the referenced advisories for more information.


FreeRADIUS FreeRADIUS 1.0.3

FreeRADIUS FreeRADIUS 1.0.4

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站