YardRadius process_menu Function Remote Buffer Overflow

critical Nessus Plugin ID 15892

Synopsis

The remote host is running a vulnerable RADIUS server that may allow a remote attacker to gain a shell.

Description

The remote host appears to be running YARD RADIUS 1.0.20 or older. This version is vulnerable to a buffer overflow that allows a remote attacker to execute arbitrary code in the context of the RADIUS server.

*** It is likely that this check made the remote RADIUS server crash ***

Solution

Upgrade to the latest version of this software.

See Also

https://seclists.org/bugtraq/2004/Nov/343

Plugin Details

Severity: Critical

ID: 15892

File Name: yardradius_overflow.nasl

Version: 1.17

Type: remote

Published: 12/1/2004

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 7/1/2004

Vulnerability Publication Date: 7/1/2004

Reference Information

CVE: CVE-2004-0987

BID: 11753

Secunia: 13312