ID |
CVE-2006-4181
|
Summary |
Format string vulnerability in the sqllog function in the SQL accounting code for radiusd in GNU Radius 1.2 and 1.3 allows remote attackers to execute arbitrary code via unknown vectors. This vulnerability is addressed in the following product release:
GNU, Radius, 1.4 |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 10.0 (as of 20-07-2017 - 01:32) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
COMPLETE |
COMPLETE |
COMPLETE |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
refmap
via4
|
bid | 21303 | gentoo | GLSA-200612-17 | idefense | 20061126 GNU Radius Format String Vulnerability | sectrack | 1017285 | secunia | 23087 | vupen | ADV-2006-4712 | xf | gnuradius-sqllog-format-string(30508) |
|
statements
via4
|
contributor | Joshua Bressers | lastmodified | 2006-12-04 | organization | Red Hat | statement | Not Vulnerable. Red Hat does not ship GNU Radius in Red Hat Enterprise Linux 2.1, 3, or 4. |
|
Last major update |
20-07-2017 - 01:32 |
Published |
28-11-2006 - 02:07 |
Last modified |
20-07-2017 - 01:32 |