Executive Summary

Informations
Name CVE-2003-0450 First vendor Publication 2003-08-07
Vendor Cve Last vendor Modification 2024-11-20

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Cistron RADIUS daemon (radiusd-cistron) 1.6.6 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large value in an NAS-Port attribute, which is interpreted as a negative number and causes a buffer overflow.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0450

OpenVAS Exploits

Date Description
2008-01-17 Name : Debian Security Advisory DSA 321-1 (radiusd-cistron)
File : nvt/deb_321_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
2219 Cistron RADIUS radiusd-cistron Overflow

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -------------------------------------------------------------------------- PACKAGE : radiusd-cistron SUMMARY : Buffer overflow vulnerability DATE : 2003-06-27 12:07:00 ID : CLA-2003:664 RELEVANT RELEASES : 7.0, 8, 9 - ------------------------------------------------------------------------- DESCRIPTION Cistron RADIUS is an authentication and accounting system for terminal servers that speak the RADIUS (Remote Authentication Dial In User Service) protocol. David Luyer reported[1] a buffer overflow vulnerability in radiusd-cistron versions <= 1.6.6 that could allow remote attackers to cause a denial of service (DoS) and possibly execute arbitrary code in the server context. The vulnerability resides in the handling of the NAS-Port attribute, which can be interpreted as a negative number, causing a buffer overflow. The Common Vulnerabilities and Exposures (CVE) project has assigned the name CAN-2003-0450 to this issue[2]. This update fixes the problem using a patched version of radiusd-cistron 1.6.6. SOLUTION All radius-cistron users should upgrade. This update will automatically restart the service if it is already running. REFERENCES: 1.http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=196063 2.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0450 3.http://distro2.conectiva.com.br/bugzilla/show_bug.cgi?id=8690 UPDATED PACKAGES ftp://atualizacoes.conectiva.com.br/7.0/RPMS/radiusd-cistron-1.6.6-1U70_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/radiusd-cistron-1.6.6-1U70_2cl.src.rpm ftp://atualizacoes.conectiva.com.br/8/RPMS/radiusd-cistron-1.6.6-5U80_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/SRPMS/radiusd-cistron-1.6.6-5U80_1cl.src.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/radiusd-cistron-1.6.6-13419U90_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/SRPMS/radiusd-cistron-1.6.6-13419U90_1cl.src.rpm ADDITIONAL INSTRUCTIONS The apt tool can be used to perform RPM packages upgrades: - run: apt-get update - after that, execute: apt-get upgrade Detailed instructions reagarding the use of apt and upgrade examples can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en - ------------------------------------------------------------------------- All packages are signed with Conectiva's GPG key. The key and instructions on how to import it can be found at http://distro.conectiva.com.br/seguranca/chave/?idioma=en Instructions on how to check the signatures of the RPM packages can be found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en - ------------------------------------------------------------------------- All our advisories and generic update instructions can be viewed at http://distro.conectiva.com.br/atualizacoes/?idioma=en - ------------------------------------------------------------------------- Copyright (c) 2003 Conectiva Inc. http://www.conectiva.com - ------------------------------------------------------------------------- subscribe: conectiva-updates-subscribe@papaleguas.conectiva.com.br unsubscribe: conectiva-updates-unsubscribe@papaleguas.conectiva.com.br -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE+/F+U42jd0JmAcZARAlFOAKCNzmMAbFhslc6gMnlvB9s005oTxQCeMYGA uM/HQtms2TwWXp2kLE+ItqA= =zydz -----END PGP SIGNATURE-----

Nessus® Vulnerability Scanner

Date Description
2004-09-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-321.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=196063
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000664
http://www.debian.org/security/2003/dsa-321
http://www.novell.com/linux/security/advisories/2003_030_radiusd_cistron.html
http://www.turbolinux.com/security/TLSA-2003-40.txt
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
Date Informations
2024-11-28 23:23:26
  • Multiple Updates
2024-11-28 12:05:37
  • Multiple Updates
2021-04-22 01:02:10
  • Multiple Updates
2020-05-23 01:35:57
  • Multiple Updates
2020-05-23 00:15:25
  • Multiple Updates
2014-02-17 10:26:15
  • Multiple Updates
2013-05-11 11:51:24
  • Multiple Updates