Bug 104195 - AUDIT-0: {Free-,Livingston}RADIUS
Summary: AUDIT-0: {Free-,Livingston}RADIUS
Status: RESOLVED FIXED
Alias: None
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other All
: P5 - None : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard: CVE-2005-4744: CVSS v2 Base Score: 6....
Keywords:
Depends on:
Blocks:
 
Reported: 2005-08-11 17:10 UTC by Thomas Biege
Modified: 2021-11-11 14:42 UTC (History)
1 user (show)

See Also:
Found By: Other
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
audit-report.pdf (24.82 KB, application/pdf)
2005-08-23 18:05 UTC, Thomas Biege
Details
audit-report.pdf (30.72 KB, application/pdf)
2005-08-24 10:36 UTC, Thomas Biege
Details
audit-report.pdf (30.96 KB, application/pdf)
2005-08-26 08:56 UTC, Thomas Biege
Details
audit-report.pdf (41.10 KB, application/pdf)
2005-08-30 09:40 UTC, Thomas Biege
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Biege 2005-08-11 17:10:06 UTC
The freeradius server needs some testing because it's widely used and *very*
complex peace of code.
Comment 1 Thomas Biege 2005-08-22 12:15:08 UTC
Marian,
I ran my radius-fuzzer against radiusd-livingston and the server crashs.

Mon Aug 22 14:00:56 2005: [13050] handle_proxy called for packet type 0 unexpectedly
Mon Aug 22 14:00:56 2005: [13050] exit on signal 100


> export CVS_RSH=ssh
> export CVSROOT=thomas@wotan.suse.de:/suse/thomas/Projekte/repository/
> cvs co radius-fuzzer
> less radius-fuzzer/INSTALL
...
> radius-fuzzer/src/radiusfuzzer --all --secret _rastesting_ --host 172.16.0.40

And then watch the radiusd die. :)

I'll inform the authors.


Comment 2 Thomas Biege 2005-08-23 18:05:09 UTC
Created attachment 47273 [details]
audit-report.pdf

audit report so far.
i'll not inform the authors now. instead we should wait until Sebastian
finishes his review.
Comment 3 Thomas Biege 2005-08-23 18:17:45 UTC
exec.c: Michael J. Hartwick <hartwick@hartwick.com>

rlm_ldap.c: Kostas Kalveras <kkalev@noc.ntua.gr>

rlm_sql.c: Mike Machado <mike@innercite.com>, Alan DeKok <aland@ox.org>

xlat.c: Alan DeKok <aland@ox.org>

sql_unixodbc.c: Dmitri Ageev <d_ageev@ortcc.ru>

rlm_realm.c: Alan DeKok <aland@ox.org>

session.c: Alan DeKok <aland@ox.org>

log.c: Chad Miller <cmiller@surfsouth.com>, Alan DeKok <aland@ox.org>, Miquel
van Smoorenburg <miquels@cistron.nl>

auth.c: Jeff Carneal <jeff@apex.net>, Miquel van Smoorenburg <miquels@cistron.nl>


Comment 4 Thomas Biege 2005-08-24 10:36:07 UTC
Created attachment 47339 [details]
audit-report.pdf

final
Comment 5 Thomas Biege 2005-08-24 10:53:57 UTC
contacted the authors, some email addresses are invalid know.
Comment 6 Thomas Biege 2005-08-26 08:56:53 UTC
Created attachment 47725 [details]
audit-report.pdf

more final report sent to the authors
Comment 7 Thomas Biege 2005-08-29 07:43:28 UTC
Patches are added to the freeradius CVS.

Livingston folks do not respond.
Comment 8 Thomas Biege 2005-08-30 09:23:34 UTC
Wolfgang,
1.0.5 will be released shortly. Can we add it to SL10?

Otherwise here are the relevant patches:
www.freeradius.org/cgi-bin/cvsweb.cgi/radiusd/src/lib/token.c.diff?r1=1.17&r2=1.18}
www.freeradius.org/cgi-bin/cvsweb.cgi/radiusd/src/main/session.c.diff?r1=1.27&r2=1.28}
www.freeradius.org/cgi-bin/cvsweb.cgi/radiusd/src/main/xlat.c.diff?r1=1.101&r2=1.102}
www.freeradius.org/cgi-bin/cvsweb.cgi/radiusd/src/main/xlat.c.diff?r1=1.72.2.6&r2=1.72.2.7}
www.freeradius.org/cgi-bin/cvsweb.cgi/radiusd/src/modules/rlm_exec/exec.c.diff?r1=1.1&r2=1.2}
www.freeradius.org/cgi-bin/cvsweb.cgi/radiusd/src/modules/rlm_exec/exec.c.diff?r1=1.2&r2=1.3}
www.freeradius.org/cgi-bin/cvsweb.cgi/radiusd/src/modules/rlm_ldap/rlm_ldap.c.diff?r1=1.153&r2=1.154}
www.freeradius.org/cgi-bin/cvsweb.cgi/radiusd/src/modules/rlm_ldap/rlm_ldap.c.diff?r1=1.122.2.6&r2=1.122.2.7}
www.freeradius.org/cgi-bin/cvsweb.cgi/radiusd/src/modules/rlm_sql/drivers/rlm_sql_unixodbc/sql_unixodbc.c.diff?r1=1.13&r2=1.14}
www.freeradius.org/cgi-bin/cvsweb.cgi/radiusd/src/modules/rlm_sql/drivers/rlm_sql_unixodbc/sql_unixodbc.c.diff?r1=1.11.2.1&r2=1.11.2.2}
www.freeradius.org/cgi-bin/cvsweb.cgi/radiusd/src/modules/rlm_sql/drivers/rlm_sql_unixodbc/sql_unixodbc.c.diff?r1=1.14&r2=1.1
Comment 9 Thomas Biege 2005-08-30 09:40:02 UTC
Created attachment 48121 [details]
audit-report.pdf

report after authors response

not all bugs are exploitable.
Comment 10 Thomas Biege 2005-08-30 10:05:15 UTC
Fixing it in STABLE only is ok.
Comment 11 Wolfgang Rosenauer 2005-08-30 11:04:17 UTC
submitted to STABLE.

@security: Please close if it fixed for you.
Comment 12 Thomas Biege 2005-08-30 11:31:46 UTC
Ok, Livingston does not respond... but it doesn't matter b/c is was just a quick
check and no code review. Should we drop radiusd-livingston?
Comment 13 Thomas Biege 2005-08-30 11:37:43 UTC
will close this
Comment 14 Marcus Meissner 2006-03-29 09:39:28 UTC
CVE-2005-4744

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4744

Off-by-one error in the sql_error function in sql_unixodbc.c in
FreeRADIUS 1.0.2.5-5, and possibly other versions including 1.0.4,
might allow remote attackers to cause a denial of service (crash) and
possibly execute arbitrary code by causing the external database query
to fail.  NOTE: this single issue is part of a larger-scale
disclosure, originally by SUSE, which reported multiple issues that
were disputed by FreeRADIUS.  Disputed issues included file descriptor
leaks, memory disclosure, LDAP injection, and other issues.  Without
additional information, the most recent FreeRADIUS report is being
regarded as the authoritative source for this CVE identifier.
Comment 15 Thomas Biege 2009-10-13 21:47:26 UTC
CVE-2005-4744: CVSS v2 Base Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)