Check Point Advisories

IPS-1 Protection Updates for yardradius and Cisco IOS Vulnerabilities and IPS-1 Protocol and Protocol Subsystems Updates

Check Point Reference: CPAI-2008-207
Date Published: 2 Mar 2008
Severity: Low
Last Updated: Tuesday 01 January, 2008
Source: DEBIAN:DSA-598
CISCO:20050629 RADIUS Authentication Bypass
Industry Reference:CVE-2004-0987
CVE-2005-2105
Protection Provided by:
Who is Vulnerable? yardradius 1.0.20
Cisco IOS 12.2T through 12.4
Vulnerability Description A vulnerability in yardradius could allow a remote attacker to execute arbitrary code via a buffer overflow. A vulnerability in Cisco IOS 12.2T through 12.4 could allows remote attackers to bypass Authentication, Authorization, and Accounting (AAA) RADIUS authentication via a long username.
Vulnerability DetailsA buffer overflow in the process_menu function in yardradius 1.0.20 allows remote attackers to execute arbitrary code.

A vulnerability in Cisco IOS 12.2T through 12.4 allows remote attackers to bypass Authentication, Authorization, and Accounting (AAA) RADIUS authentication, if the fallback method is set to none, via a long username.

Twenty seven protocols and protocol subsystems have undergone configuration changes and the following protocol and protocol subsystems have received updates:
Attack (v21) Prevent action has been added to attack_prevention:IPS_ATTACKS, sensor mode has been added to alert details and values of SRC_OS and DST_OS in alert details.
IMAP (v22) False positives in the imap_literallength:literal_length_alert and imap_commandlen2:novell_dos_alert
IRC (v15) Port numbers are now included in alerts triggered by Badfiles for IRC traffic.
NDMP (v9) Default values for ndmp:BACKUP_SERVERS and a hostinfo_too_large_alert has been added to the configuration file.
P2P (v8) Port numbers have been added to alerts triggered by Badfiles for P2P traffic.
Policy Configuration Settings (v25) Packet captures have been added to the final summary alert.
POP (v19) Port numbers have been added to alerts triggered by Badfiles for POP traffic.
RADIUS (v13) The ptotocol parser has been improved.
SMTP2 (v19) Port numbers have been added to alerts triggered by Badfiles for SMTP 2 traffic and the protocol parser has been improved.
TCP (v25) Port numbers have been added to the following  alerts 
tcp_badflags:badflags_alert,
tcp_badflags:tcp_segment_overlap_diff_alert
tcp_badflags:tcpbadrst_alert 
UDP (v14) Alert details have been added to udp_portscan:portscan_alert.
WWW 2 (v3

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK