Package: freeradius
Version: 1.0.2-3
Severity: wishlist
Tags: security

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

In /src/modules/rlm_sql/rlm_sql.c there are few possible problems (IMHO).
Please disregard the message if you disagree.

In sql_escape_func (line 406) there is a loop with special break condition
in line 414 ("if (outlen <= 1)"), which is fine unless we have three (3) or
less characters available and input character needs escaping (with =XX). In
this case this loop causes minor buffer overflow (few characters). As output
buffer is huge, this should not be easily exploitable problem.

The other three problems are in lines 520, 1152, 1196 where radius_xlat is
called for generation of sql query for execution. It's called without escape
function (NULL), which is afterwards replaced with simple copy. As this
queries may contain reference to user supplied data (username ...), this may
result in SQL injection. This is also hard to exploit as user has to be
authenticated already before any of these sql statements can get executed.

Primoz Bratanic

- -- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.10-1-686-smp
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages freeradius depends on:
ii  libc6                       2.3.2.ds1-21 GNU C Library: Shared libraries an
ii  libgdbm3                    1.8.3-2      GNU dbm database routines (runtime
ii  libltdl3                    1.5.6-6      A system independent dlopen wrappe
ii  libpam0g                    0.76-22      Pluggable Authentication Modules l

- -- no debconf information

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFCeVPhHOuqnSwJthERAvvhAKCS917GnwK+t9W6mqUCznfxeuKEygCffDbT
S9UM07PrA9Sfl1OPq2vsVb4=
=HaZ7
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to