Package: yardradius
Version: 1.1.2-4
Severity: critical ( security)

Dear Maintainer,

Several Format String vulnerabilities was found in the latest `yardradius` 
version as explained further below :

src/log.c :

void
log_msg(int priority,char *fmt, va_list args)
{
...
 char buffer[1024];
...
 vfprintf(msgfd, fmt, args);
...
        vsnprintf(buffer,1024,fmt, args); 
#if defined(HAVE_SYSLOG)
        syslog(priority, buffer); 
...
        vsyslog(priority, fmt, args); 
...
}

So an attacker can fill fmt by for ex. "%x" and see the addressess.

############

src/version.c :

#define STRVER "%s : YARD Radius Server %s ... $ "

void
version(void)
{
        char buffer[1024];

        build_version(buffer,sizeof(buffer));
        fprintf(stderr, buffer);
        exit(-1);
}

...

void
build_version(char *bp,size_t sizeofbp)
{
        snprintf(bp,sizeofbp-1,STRVER, progname, VERSION);
..

$ ln -s radiusd %x
$ ./%x -v
./b77c0ff4 : YARD Radius Server 1.1 ...

It seems more of this type vulnerability exists in the source
if i find any other bug i will file them ...

if i can help in patching or anything , please let me know

Thank you
Hamid Zamani


-- System Information:
Debian Release: Kali Linux 1.0
Architecture: i386 (i686)

Kernel: Linux 3.7-trunk-686-pae (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages yardradius depends on:
ii  libc6           2.13-38
ii  libgdbm3        1.8.3-11
ii  libpam-runtime  1.1.3-7.1
ii  libpam0g        1.1.3-7.1

yardradius recommends no packages.

yardradius suggests no packages.

-- no debconf information


                                          

Reply via email to