This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200505-13
(FreeRADIUS: SQL injection and Denial of Service vulnerability)
Primoz Bratanic discovered that the sql_escape_func function of
FreeRADIUS may be vulnerable to a buffer overflow (BID 13541). He also
discovered that FreeRADIUS fails to sanitize user-input before using it
in a SQL query, possibly allowing SQL command injection (BID 13540).
By supplying carefully crafted input, a malicious user could cause an
SQL injection or a buffer overflow, possibly leading to the disclosure
and the modification of sensitive data or Denial of Service by crashing
There are no known workarounds at this time.
See also :
All FreeRADIUS users should upgrade to the latest available version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=net-dialup/freeradius-1.0.2-r4'
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : true
Family: Gentoo Local Security Checks
Nessus Plugin ID: 18272 (gentoo_GLSA-200505-13.nasl)
Bugtraq ID: 1354013541
CVE ID: CVE-2005-1454CVE-2005-1455
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.