Check Point Reference: | CPAI-2008-207 |
Date Published: | 2 Mar 2008 |
Severity: | Low |
Last Updated: | Tuesday 01 January, 2008 |
Source: | DEBIAN:DSA-598 CISCO:20050629 RADIUS Authentication Bypass |
Industry Reference: | CVE-2004-0987 CVE-2005-2105 |
Protection Provided by: | |
Who is Vulnerable? | yardradius 1.0.20 Cisco IOS 12.2T through 12.4 |
Vulnerability Description | A vulnerability in yardradius could allow a remote attacker to execute arbitrary code via a buffer overflow. A vulnerability in Cisco IOS 12.2T through 12.4 could allows remote attackers to bypass Authentication, Authorization, and Accounting (AAA) RADIUS authentication via a long username. |
Vulnerability Details | A buffer overflow in the process_menu function in yardradius 1.0.20 allows remote attackers to execute arbitrary code. A vulnerability in Cisco IOS 12.2T through 12.4 allows remote attackers to bypass Authentication, Authorization, and Accounting (AAA) RADIUS authentication, if the fallback method is set to none, via a long username. Twenty seven protocols and protocol subsystems have undergone configuration changes and the following protocol and protocol subsystems have received updates: |