The FreeRADIUS server is vulnerable to an SQL injection attack and a buffer overflow, possibly resulting in disclosure and modification of data and Denial of Service.
| Package | net-dialup/freeradius on all architectures | 
|---|---|
| Affected versions | < 1.0.2-r4 | 
| Unaffected versions | >= 1.0.2-r4 | 
FreeRADIUS is an open source RADIUS authentication server implementation.
Primoz Bratanic discovered that the sql_escape_func function of FreeRADIUS may be vulnerable to a buffer overflow (BID 13541). He also discovered that FreeRADIUS fails to sanitize user-input before using it in a SQL query, possibly allowing SQL command injection (BID 13540).
By supplying carefully crafted input, a malicious user could cause an SQL injection or a buffer overflow, possibly leading to the disclosure and the modification of sensitive data or Denial of Service by crashing the server.
There are no known workarounds at this time.
All FreeRADIUS users should upgrade to the latest available version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-dialup/freeradius-1.0.2-r4"
      Release date
      
      May 17, 2005
    
      Latest revision
      
      May 22, 2006: 03
    
      Severity
      
      normal
    
      Exploitable
      
      remote
    
Bugzilla entries