ID CVE-2006-4181
Summary Format string vulnerability in the sqllog function in the SQL accounting code for radiusd in GNU Radius 1.2 and 1.3 allows remote attackers to execute arbitrary code via unknown vectors. This vulnerability is addressed in the following product release: GNU, Radius, 1.4
References
Vulnerable Configurations
  • cpe:2.3:a:gnu:radius:1.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:radius:1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:radius:1.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:radius:1.3:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 20-07-2017 - 01:32)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
refmap via4
bid 21303
gentoo GLSA-200612-17
idefense 20061126 GNU Radius Format String Vulnerability
sectrack 1017285
secunia 23087
vupen ADV-2006-4712
xf gnuradius-sqllog-format-string(30508)
statements via4
contributor Joshua Bressers
lastmodified 2006-12-04
organization Red Hat
statement Not Vulnerable. Red Hat does not ship GNU Radius in Red Hat Enterprise Linux 2.1, 3, or 4.
Last major update 20-07-2017 - 01:32
Published 28-11-2006 - 02:07
Last modified 20-07-2017 - 01:32
Back to Top