Cistron RADIUS daemon (radiusd-cistron) 1.6.6 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large value in an NAS-Port attribute, which is interpreted as a negative number and causes a buffer overflow.
Link | Tags |
---|---|
http://www.turbolinux.com/security/TLSA-2003-40.txt | patch vendor advisory |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=196063 | exploit patch vendor advisory |
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000664 | vendor advisory |
http://www.debian.org/security/2003/dsa-321 | patch vendor advisory |
http://www.novell.com/linux/security/advisories/2003_030_radiusd_cistron.html | vendor advisory |