SuSE: 'radiusd-cistron' Buffer overflow vulnerability
Summary
______________________________________________________________________________
SuSE Security Announcement
Package: radiusd-cistron
Announcement-ID: SuSE-SA:2002:013
Date: Mon Apr 29 13:00:00 CEST 2002
Affected products: 6.4, 7.0, 7.1, 7.2, 7.3,
Enterprise Server 7
Vulnerability Type: remote command execution
Severity (1-10): 7
SuSE default package: No
Other affected systems: Various radius clients and servers.
Content of this advisory:
1) security vulnerability resolved: digest calculation buffer overflow,
invalid attribute length calculation
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
The radius daemon as shipped with the radiusd-cistron package is
responsible for the RADIUS authentication service in networks and therefore
considered a security critical application.
ZARAZA reported security releated bugs in various radius server and
client software. The list of vulnerable servers includes the cistron radius
package. Within the cistron package, a buffer overflow in the digest
calculation function and miscalculations of attribute lengths have been
fixed which could allow remote attackers to execute arbitrary commands on
the system running the radius server. Beside the cistron radius package the
following radius packages have been vulnerable to the same attacks and have
been fixed: freeradius, radiusclient and livingston-radius.
The only workaround for this bug is to disable the radius-server until
the new packages have been installed.
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.
Once you successfully updated your radius packages, make sure you restart
the radius server by issuing the following command as root:
"/etc/rc.d/radiusd restart"
"/etc/rc.d/radiusd" automatically invokes the correct radius-server which
is part of either the cistron, livingston or freeradius package.
i386 Intel Platform:
SuSE-7.3
8215e7113e8937844ab5d2deba8bbb13
source rpm:
978edf49cf7fa28c5e872bc48ba504ab
SuSE-7.2
964904ef67f81b2d19f1c8ef2ccc6f61
source rpm:
6ffd720c4ceb0e0c6d22446178d8bf11
SuSE-7.1
52ec1da0c4b750fe63d506713ff56c5e
source rpm:
6d34cc16bf9adcc93eac095570f49748
SuSE-7.0
52a9b0c7fcbd45973db6508d155edf21
source rpm:
a22a646d5f04dd853906db9cc465f14a
SuSE-6.4
bed8804bf53822d7f7bcdd54f00a9d89
source rpm:
b47877d68465e895fe899da9ba89709d
Sparc Platform:
SuSE-7.3
3230120f925437fd36b648991a3b4851
source rpm:
713f6f1f7fe4c2987a52b12df6ef2c4a
SuSE-7.1
d444432bd863523992620401311f948b
source rpm:
ff7a7f432a0a32fbed31a6ee680d5118
SuSE-7.0
69ee7178a0312685a169386180cd5e9e
source rpm:
71632b60b9b2bee4df06f940088b0ab6
AXP Alpha Platform:
SuSE-7.1
323032020d8c82724b12904db456c135
source rpm:
7440831ddb1e394ac6595e9e5bebbff1
SuSE-7.0
4deb36542c3a76a9246618abcd656d96
source rpm:
77c3cfe8cb64d7c2cd59b81e0e1e26ea
SuSE-6.4
0c39bec71f6671c55b46ed627f2830d9
source rpm:
8783c9b8f519a1623bf6df52a8878ab0
PPC Power PC Platform:
SuSE-7.3
a541869da6cfa45822887dc69f7730f8
source rpm:
da491549cda05ead01d2dd0519f14eeb
SuSE-7.1
998f87b937ec36e55ee0151f82a071fa
source rpm:
ebb96d0b9b5093a5324c90743f7a69a3
SuSE-7.0
7258462a504e594f07433f342b0870c1
source rpm:
d6ebb9cdd5c3538eae2db805f6fda97b
SuSE-6.4
6274908e60a8ff24a3be7c4936b36d90
source rpm:
aa350c9fedc384c382744b4b2563250c
______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds:
- mtr
A buffer overflow was found in mtr, which enables an attacker
to get access to mtr's raw socket. Fixed RPM packages are
available from our ftp servers. Additionally you should
remove the setuid bit from mtr and add an appropriate entry
in /etc/permissions.local.
- webalizer
A possible buffer overflow in the webalizer DNS resolv code
was found. The bug seems no to be exploitable. The SuSE Security
Team fixed this and other possible bugs in the webalizer code.
New RPM packages will be available on our FTP servers.
- ntop
Version < 2.0.99 of ntop could be crashed by feeding ntop's HTTP
code with invalid URL's. This bug does not exist in ntop version 2.0.1
which is shipped with SuSE 8.0.
- slrnpull
Problems with slrnpull have been reported on the bugtraq mailinglist.
SuSE does not ship this program setuid and is therefore not vulnerable
to the buffer overflow attack against this program.
- openssh
Niels Provos published a local exploitable bug for OpenSSH.
This bug could only be exploited if Kerberos and AFS support was
enabled while compiling OpenSSH. The OpenSSH RPM file that comes with
SuSE hasn't enabled Kerberos nor AFS, so we are not vulnerable to this
attack. The bug will be fixed with the next security update of OpenSSH.
______________________________________________________________________________
3) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SuSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum
References