First published: Tue Nov 28 2006(Updated: )
Format string vulnerability in the sqllog function in the SQL accounting code for radiusd in GNU Radius 1.2 and 1.3 allows remote attackers to execute arbitrary code via unknown vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Radius | =1.2 | |
GNU Radius | =1.3 | |
=1.2 | ||
=1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4181 is classified as a critical vulnerability due to the potential for remote code execution.
To mitigate CVE-2006-4181, upgrade to a version of GNU Radius later than 1.3 that includes patches for this vulnerability.
CVE-2006-4181 affects GNU Radius versions 1.2 and 1.3.
CVE-2006-4181 allows remote attackers to execute arbitrary code on vulnerable systems.
Yes, there are reports indicating potential public exploits for CVE-2006-4181 that leverage the format string vulnerability.