Gentoo: cistronradius Buffer overflow vulnerability
Summary
- - --------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200307-03 - - ---------------------------------------------------------------------
- - ---------------------------------------------------------------------
quote from CVE: "Cistron RADIUS daemon (radiusd-cistron) 1.6.6 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large value in an NAS-Port attribute, which is interpreted as a negative number and causes a buffer overflow."
SOLUTION
It is recommended that all Gentoo Linux users who are running net-dialup/cistronradius upgrade to cistronradius-1.6.6-r1 as follows
emerge sync emerge cistronradius emerge clean
- - --------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at - - ---------------------------------------------------------------------
Resolution
References
Availability
Concerns
Background