http://www.theregister.co.uk/content/5/24298.html By Thomas C Greene in Washington Posted: 05/03/2002 at 20:46 GMT Numerous holes in the ubiquitous RADIUS (remote authentication dial-in user service) protocol can be exploited with results including denial of service and running arbitrary code on the target device, a Russian security researcher has demonstrated. The risk of the DoS attack is considerably greater, and can be achieved two ways. First up, according to a bulletin  by '3APA3A', during authentication in several implementations a digest is created consisting of an initial packet, a message authenticator and a shared secret concatenated and calculated as an MD5 hash. Unfortunately, the process doesn't check for adequate space in the target buffer. Thus a shared secret can be used to overload the buffer, and cause a denial of service. If the shared secret were accurately guessed, an attacker could get privileges on the target RADIUS client or server. While this is far from a trivial exercise, we note that according to  researcher Joshua Hill, "most client and server implementations only allow shared secrets to be input as ASCII strings. There are only 94 different ASCII characters that can be entered from a standard US style keyboard (out of the 256 possible). Many implementations also restrict the total length of the shared secret to 16 characters or less. Both of these restrictions artificially reduce the size of the keyspace that an attacker must search in order to guess the shared secret." Next up, still following the 3APA3A bulletin, we have improper validation of a vendor-specific attribute. Vendor-specific and user-specific attributes can be passed to the client. If the vendor-specific header contains less than two bytes, it will be calculated as a negative number and a denial of service will result. It is not necessary to know the shared secret to abuse this flaw. RADIUS is used widely by ISPs and NSPs for remote user authentication, so these issues are likely to affect a large number of admins and a vast heap of equipment and software. It's ubiquitous chiefly because it's embedded in numerous devices such as routers and switches. 3APA3A has a simple tool for testing RADIUS vulnerabilities available here . CERT has a bulletin listing all equipment and software presently known to be vulnerable, along with links to the vendors, posted here .  http://www.security.nnov.ru/advisories/radius.asp  http://www.untruth.org/~josh/security/radius/radius-auth.html  http://www.security.nnov.ru/files/test_radius.c  http://www.cert.org/advisories/CA-2002-06.html - ISN is currently hosted by Attrition.org To unsubscribe email majordomoat_private with 'unsubscribe isn' in the BODY of the mail.
This archive was generated by hypermail 2b30 : Wed Mar 06 2002 - 03:37:20 PST