Korean
<< Back
VID 12066
Severity 40
Port 1812
Protocol UDP
Class RADIUS
Detailed Description The Yard Radius seems to be vulnerable to a stack-based buffer overflow vulnerability. Yard Radius is a freely-available software that extends and adds features to the Radius Server. Yard Radius versions 1.0.20 and earlier are vulnerable to a stack-based buffer overflow in the process_menu() function. This vulnerability could reportedly be exploited prior to authentication. A remote attacker can trigger a stack overflow and potentially execute arbitrary code on the affected system with root privileges.

* References:
http://securitytracker.com/alerts/2004/Nov/1012325.html

* Platforms Affected:
SourceForge.net, YardRadius 1.0.20 and earlier
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of YardRadius (1.0.21 or later), available from the SourceForge.net Web site at http://yardradius.sourceforge.net/

For Debian GNU/Linux 3.0 (woody):
Upgrade to the latest version of yardradius, as listed in Debian Security Advisory DSA-598-1 at http://www.debian.org/security/2004/dsa-598

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL CVE-2004-0987 (CVE)
Related URL 11753 (SecurityFocus)
Related URL 18270 (ISS)