SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   FreeRADIUS Vendors:   FreeRADIUS Server Project
(Red Hat Issues Fix) FreeBSD 'rlm_sql.c' Contains SQL Injection and Buffer Overflow Bugs
SecurityTracker Alert ID:  1014281
SecurityTracker URL:  http://securitytracker.com/id/1014281
CVE Reference:   CVE-2005-1454, CVE-2005-1455   (Links to External Site)
Date:  Jun 23 2005
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.0.2
Description:   Two vulnerabilities were reported in FreeRADIUS. A remote authenticated user may be able to inject SQL commands. A remote user may also be able to execute arbitrary code on the target system.

The software makes a radius_xlat() function call to compose an SQL query based on user-supplied data but does not properly validate the data. A remote authenticated user may be able to execute SQL commands on the underlying database.

A buffer overflow resides in the sql_escape_func() function.

The flaws reside in '/src/modules/rlm_sql/rlm_sql.c'.

Primoz Bratanic reported this vulnerability.

Impact:   A remote user may be able to execute SQL commands on the underlying database.

A remote user may be able to execute arbitrary code on the target system [however, code execution was not confirmed.]

Solution:   Red Hat has released a fix.

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/freeradius-1.0.1-1.1.RHEL3.src.rpm
1fd359fe09899c240dd58c6b1cba38b7 freeradius-1.0.1-1.1.RHEL3.src.rpm

i386:
8fd519d93b3871849933b28f7e1bc2d9 freeradius-1.0.1-1.1.RHEL3.i386.rpm

ia64:
5442a3527c92a8d07d08acd77dace190 freeradius-1.0.1-1.1.RHEL3.ia64.rpm

ppc:
fd51f53af3f1e45fe6c0dad9a68fbad0 freeradius-1.0.1-1.1.RHEL3.ppc.rpm

s390:
536f28bdca07bf52391d5cae2e8f073c freeradius-1.0.1-1.1.RHEL3.s390.rpm

s390x:
209ec09aa78f6e0e4ab8f26f4b356182 freeradius-1.0.1-1.1.RHEL3.s390x.rpm

x86_64:
4b1d9482db8d45cb79e6c522e72cb25a freeradius-1.0.1-1.1.RHEL3.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/freeradius-1.0.1-1.1.RHEL3.src.rpm
1fd359fe09899c240dd58c6b1cba38b7 freeradius-1.0.1-1.1.RHEL3.src.rpm

i386:
8fd519d93b3871849933b28f7e1bc2d9 freeradius-1.0.1-1.1.RHEL3.i386.rpm

ia64:
5442a3527c92a8d07d08acd77dace190 freeradius-1.0.1-1.1.RHEL3.ia64.rpm

x86_64:
4b1d9482db8d45cb79e6c522e72cb25a freeradius-1.0.1-1.1.RHEL3.x86_64.rpm

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/freeradius-1.0.1-3.RHEL4.src.rpm
454ecaca99cdbbbd70d31b72aae7e682 freeradius-1.0.1-3.RHEL4.src.rpm

i386:
ff75a31027509f376c3706efaeb10305 freeradius-1.0.1-3.RHEL4.i386.rpm
ff28f13e57713e277a74b789969bc583 freeradius-mysql-1.0.1-3.RHEL4.i386.rpm
3dc1a74e7dd8ce755e60887ac4fd73cc freeradius-postgresql-1.0.1-3.RHEL4.i386.rpm
eab011f77b2bce24d42e5608abcea1ed freeradius-unixODBC-1.0.1-3.RHEL4.i386.rpm

ia64:
0eac053fe887cd2f8c805badd511b91e freeradius-1.0.1-3.RHEL4.ia64.rpm
de0ccf2e0a508eba3062bfdd5b222835 freeradius-mysql-1.0.1-3.RHEL4.ia64.rpm
0de26700a43c17adeec0498db847a5bc freeradius-postgresql-1.0.1-3.RHEL4.ia64.rpm
bcc8c5f0ea86f06cbb8f182e0b2e427f freeradius-unixODBC-1.0.1-3.RHEL4.ia64.rpm

ppc:
0bdd63fef27bd242ed17f48598e25194 freeradius-1.0.1-3.RHEL4.ppc.rpm
68eadec552a9d1f1ec5bd15b90f91b3a freeradius-mysql-1.0.1-3.RHEL4.ppc.rpm
8be58c952be576172e7f5c50908a3fde freeradius-postgresql-1.0.1-3.RHEL4.ppc.rpm
76013d354aa7ad542685dc72d62edde5 freeradius-unixODBC-1.0.1-3.RHEL4.ppc.rpm

s390:
d42b57021c61dbfea75314cf7a947f8b freeradius-1.0.1-3.RHEL4.s390.rpm
0a86a8b88be9aff82f04ea734b1e43eb freeradius-mysql-1.0.1-3.RHEL4.s390.rpm
cdf1a574f93ade40e99e086f28c81b14 freeradius-postgresql-1.0.1-3.RHEL4.s390.rpm
8441481b5543541d5aae8a3d7bd896cc freeradius-unixODBC-1.0.1-3.RHEL4.s390.rpm

s390x:
67feac31092680e592c0c0ed7e31ee0c freeradius-1.0.1-3.RHEL4.s390x.rpm
a369980828701e0694200269c6fd8777 freeradius-mysql-1.0.1-3.RHEL4.s390x.rpm
5d43a5e4ea7b32c74c9b5488172781f7 freeradius-postgresql-1.0.1-3.RHEL4.s390x.rpm
19d3425135a11bfe28fcf09438d298f6 freeradius-unixODBC-1.0.1-3.RHEL4.s390x.rpm

x86_64:
216dcc841b3ef864f866d0536d2e4769 freeradius-1.0.1-3.RHEL4.x86_64.rpm
3a709b00d74cd9e89f1bf1d82f0874a4 freeradius-mysql-1.0.1-3.RHEL4.x86_64.rpm
a41378ac35d1b3ab52b9f0217812aef2 freeradius-postgresql-1.0.1-3.RHEL4.x86_64.rpm
422c04328234167649bb811f882cb774 freeradius-unixODBC-1.0.1-3.RHEL4.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/freeradius-1.0.1-3.RHEL4.src.rpm
454ecaca99cdbbbd70d31b72aae7e682 freeradius-1.0.1-3.RHEL4.src.rpm

i386:
ff75a31027509f376c3706efaeb10305 freeradius-1.0.1-3.RHEL4.i386.rpm
ff28f13e57713e277a74b789969bc583 freeradius-mysql-1.0.1-3.RHEL4.i386.rpm
3dc1a74e7dd8ce755e60887ac4fd73cc freeradius-postgresql-1.0.1-3.RHEL4.i386.rpm
eab011f77b2bce24d42e5608abcea1ed freeradius-unixODBC-1.0.1-3.RHEL4.i386.rpm

ia64:
0eac053fe887cd2f8c805badd511b91e freeradius-1.0.1-3.RHEL4.ia64.rpm
de0ccf2e0a508eba3062bfdd5b222835 freeradius-mysql-1.0.1-3.RHEL4.ia64.rpm
0de26700a43c17adeec0498db847a5bc freeradius-postgresql-1.0.1-3.RHEL4.ia64.rpm
bcc8c5f0ea86f06cbb8f182e0b2e427f freeradius-unixODBC-1.0.1-3.RHEL4.ia64.rpm

x86_64:
216dcc841b3ef864f866d0536d2e4769 freeradius-1.0.1-3.RHEL4.x86_64.rpm
3a709b00d74cd9e89f1bf1d82f0874a4 freeradius-mysql-1.0.1-3.RHEL4.x86_64.rpm
a41378ac35d1b3ab52b9f0217812aef2 freeradius-postgresql-1.0.1-3.RHEL4.x86_64.rpm
422c04328234167649bb811f882cb774 freeradius-unixODBC-1.0.1-3.RHEL4.x86_64.rpm

Vendor URL:  www.freeradius.org/ (Links to External Site)
Cause:   Boundary error, Input validation error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  3, 4

Message History:   This archive entry is a follow-up to the message listed below.
May 6 2005 FreeBSD 'rlm_sql.c' Contains SQL Injection and Buffer Overflow Bugs



 Source Message Contents

Subject:  [RHSA-2005:524-01] Moderate: freeradius security update


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Moderate: freeradius security update
Advisory ID:       RHSA-2005:524-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-524.html
Issue date:        2005-06-23
Updated on:        2005-06-23
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2005-1454 CAN-2005-1455
- ---------------------------------------------------------------------

1. Summary:

Updated freeradius packages that fix a buffer overflow and possible SQL
injection attacks in the sql module are now available.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64

3. Problem description:

FreeRADIUS is a high-performance and highly configurable free RADIUS server
designed to allow centralized authentication and authorization for a network.

A buffer overflow bug was found in the way FreeRADIUS escapes data in an
SQL query. An attacker may be able to crash FreeRADIUS if they cause
FreeRADIUS to escape a string containing three or less characters. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2005-1454 to this issue.

Additionally a bug was found in the way FreeRADIUS escapes SQL data. It is
possible that an authenticated user could execute arbitrary SQL queries by
sending a specially crafted request to FreeRADIUS. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2005-1455 to this issue.

Users of FreeRADIUS should update to these erratum packages, which contain
backported patches and are not vulnerable to these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

156941 - CAN-2005-1454 Multiple issues in freeradius (CAN-2005-1455)


6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/freeradius-1.0.1-1.1.RHEL3.src.rpm
1fd359fe09899c240dd58c6b1cba38b7  freeradius-1.0.1-1.1.RHEL3.src.rpm

i386:
8fd519d93b3871849933b28f7e1bc2d9  freeradius-1.0.1-1.1.RHEL3.i386.rpm

ia64:
5442a3527c92a8d07d08acd77dace190  freeradius-1.0.1-1.1.RHEL3.ia64.rpm

ppc:
fd51f53af3f1e45fe6c0dad9a68fbad0  freeradius-1.0.1-1.1.RHEL3.ppc.rpm

s390:
536f28bdca07bf52391d5cae2e8f073c  freeradius-1.0.1-1.1.RHEL3.s390.rpm

s390x:
209ec09aa78f6e0e4ab8f26f4b356182  freeradius-1.0.1-1.1.RHEL3.s390x.rpm

x86_64:
4b1d9482db8d45cb79e6c522e72cb25a  freeradius-1.0.1-1.1.RHEL3.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/freeradius-1.0.1-1.1.RHEL3.src.rpm
1fd359fe09899c240dd58c6b1cba38b7  freeradius-1.0.1-1.1.RHEL3.src.rpm

i386:
8fd519d93b3871849933b28f7e1bc2d9  freeradius-1.0.1-1.1.RHEL3.i386.rpm

ia64:
5442a3527c92a8d07d08acd77dace190  freeradius-1.0.1-1.1.RHEL3.ia64.rpm

x86_64:
4b1d9482db8d45cb79e6c522e72cb25a  freeradius-1.0.1-1.1.RHEL3.x86_64.rpm

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/freeradius-1.0.1-3.RHEL4.src.rpm
454ecaca99cdbbbd70d31b72aae7e682  freeradius-1.0.1-3.RHEL4.src.rpm

i386:
ff75a31027509f376c3706efaeb10305  freeradius-1.0.1-3.RHEL4.i386.rpm
ff28f13e57713e277a74b789969bc583  freeradius-mysql-1.0.1-3.RHEL4.i386.rpm
3dc1a74e7dd8ce755e60887ac4fd73cc  freeradius-postgresql-1.0.1-3.RHEL4.i386.rpm
eab011f77b2bce24d42e5608abcea1ed  freeradius-unixODBC-1.0.1-3.RHEL4.i386.rpm

ia64:
0eac053fe887cd2f8c805badd511b91e  freeradius-1.0.1-3.RHEL4.ia64.rpm
de0ccf2e0a508eba3062bfdd5b222835  freeradius-mysql-1.0.1-3.RHEL4.ia64.rpm
0de26700a43c17adeec0498db847a5bc  freeradius-postgresql-1.0.1-3.RHEL4.ia64.rpm
bcc8c5f0ea86f06cbb8f182e0b2e427f  freeradius-unixODBC-1.0.1-3.RHEL4.ia64.rpm

ppc:
0bdd63fef27bd242ed17f48598e25194  freeradius-1.0.1-3.RHEL4.ppc.rpm
68eadec552a9d1f1ec5bd15b90f91b3a  freeradius-mysql-1.0.1-3.RHEL4.ppc.rpm
8be58c952be576172e7f5c50908a3fde  freeradius-postgresql-1.0.1-3.RHEL4.ppc.rpm
76013d354aa7ad542685dc72d62edde5  freeradius-unixODBC-1.0.1-3.RHEL4.ppc.rpm

s390:
d42b57021c61dbfea75314cf7a947f8b  freeradius-1.0.1-3.RHEL4.s390.rpm
0a86a8b88be9aff82f04ea734b1e43eb  freeradius-mysql-1.0.1-3.RHEL4.s390.rpm
cdf1a574f93ade40e99e086f28c81b14  freeradius-postgresql-1.0.1-3.RHEL4.s390.rpm
8441481b5543541d5aae8a3d7bd896cc  freeradius-unixODBC-1.0.1-3.RHEL4.s390.rpm

s390x:
67feac31092680e592c0c0ed7e31ee0c  freeradius-1.0.1-3.RHEL4.s390x.rpm
a369980828701e0694200269c6fd8777  freeradius-mysql-1.0.1-3.RHEL4.s390x.rpm
5d43a5e4ea7b32c74c9b5488172781f7  freeradius-postgresql-1.0.1-3.RHEL4.s390x.rpm
19d3425135a11bfe28fcf09438d298f6  freeradius-unixODBC-1.0.1-3.RHEL4.s390x.rpm

x86_64:
216dcc841b3ef864f866d0536d2e4769  freeradius-1.0.1-3.RHEL4.x86_64.rpm
3a709b00d74cd9e89f1bf1d82f0874a4  freeradius-mysql-1.0.1-3.RHEL4.x86_64.rpm
a41378ac35d1b3ab52b9f0217812aef2  freeradius-postgresql-1.0.1-3.RHEL4.x86_64.rpm
422c04328234167649bb811f882cb774  freeradius-unixODBC-1.0.1-3.RHEL4.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/freeradius-1.0.1-3.RHEL4.src.rpm
454ecaca99cdbbbd70d31b72aae7e682  freeradius-1.0.1-3.RHEL4.src.rpm

i386:
ff75a31027509f376c3706efaeb10305  freeradius-1.0.1-3.RHEL4.i386.rpm
ff28f13e57713e277a74b789969bc583  freeradius-mysql-1.0.1-3.RHEL4.i386.rpm
3dc1a74e7dd8ce755e60887ac4fd73cc  freeradius-postgresql-1.0.1-3.RHEL4.i386.rpm
eab011f77b2bce24d42e5608abcea1ed  freeradius-unixODBC-1.0.1-3.RHEL4.i386.rpm

ia64:
0eac053fe887cd2f8c805badd511b91e  freeradius-1.0.1-3.RHEL4.ia64.rpm
de0ccf2e0a508eba3062bfdd5b222835  freeradius-mysql-1.0.1-3.RHEL4.ia64.rpm
0de26700a43c17adeec0498db847a5bc  freeradius-postgresql-1.0.1-3.RHEL4.ia64.rpm
bcc8c5f0ea86f06cbb8f182e0b2e427f  freeradius-unixODBC-1.0.1-3.RHEL4.ia64.rpm

x86_64:
216dcc841b3ef864f866d0536d2e4769  freeradius-1.0.1-3.RHEL4.x86_64.rpm
3a709b00d74cd9e89f1bf1d82f0874a4  freeradius-mysql-1.0.1-3.RHEL4.x86_64.rpm
a41378ac35d1b3ab52b9f0217812aef2  freeradius-postgresql-1.0.1-3.RHEL4.x86_64.rpm
422c04328234167649bb811f882cb774  freeradius-unixODBC-1.0.1-3.RHEL4.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1454
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1455

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFCuw9EXlSAg2UNWIIRArAuAJ0bMr7qTjecKGU6RRtqDzBqLa7l+QCgxTyb
G3LY9a35RPjFeBUG3RdZs4g=
=cKr1
-----END PGP SIGNATURE-----


-- 
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC