Gentoo Archives: gentoo-announce

From: aliz@gentoo.org (Daniel Ahlberg)
To: gentoo-announce@g.o
Subject: GLSA: cistonradius (200307-03)
Date: Fri, 11 Jul 2003 14:15:46
Message-Id: 20030711135726.012A724F80B@noc.internal.fairytale.se
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - - ---------------------------------------------------------------------
5 GENTOO LINUX SECURITY ANNOUNCEMENT 200307-03
6 - - - ---------------------------------------------------------------------
7
8           PACKAGE : cistonradius
9           SUMMARY : buffer overflow
10              DATE : 2003-07-11 13:57 UTC
11           EXPLOIT : remote
12 VERSIONS AFFECTED : <cistronradius-1.6.6-r1
13     FIXED VERSION : >=cistronradius-1.6.6-r1
14               CVE : CAN-2003-0450
15
16 - - - ---------------------------------------------------------------------
17
18 quote from CVE:
19 "Cistron RADIUS daemon (radiusd-cistron) 1.6.6 and earlier allows remote
20 attackers to cause a denial of service and possibly execute arbitrary
21 code via a large value in an NAS-Port attribute, which is interpreted
22 as a negative number and causes a buffer overflow."
23
24 SOLUTION
25
26 It is recommended that all Gentoo Linux users who are running
27 net-dialup/cistronradius upgrade to cistronradius-1.6.6-r1 as follows
28
29 emerge sync
30 emerge cistronradius
31 emerge clean
32
33 - - - ---------------------------------------------------------------------
34 aliz@g.o - GnuPG key is available at http://dev.gentoo.org/~aliz
35 - - - ---------------------------------------------------------------------
36 -----BEGIN PGP SIGNATURE-----
37 Version: GnuPG v1.2.2 (GNU/Linux)
38
39 iD8DBQE/DsJGfT7nyhUpoZMRAtywAKCGIJog6cuws22Hik1a3i6/gxz7ogCdEjFJ
40 8EALai5C7bskp5qhwxbPj3k=
41 =POu6
42 -----END PGP SIGNATURE-----