Feeds

New RADIUS vulns exposed

No rest for the wicked

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Numerous holes in the ubiquitous RADIUS (remote authentication dial-in user service) protocol can be exploited with results including denial of service and running arbitrary code on the target device, a Russian security researcher has demonstrated. The risk of the DoS attack is considerably greater, and can be achieved two ways.

First up, according to a bulletin by '3APA3A', during authentication in several implementations a digest is created consisting of an initial packet, a message authenticator and a shared secret concatenated and calculated as an MD5 hash. Unfortunately, the process doesn't check for adequate space in the target buffer. Thus a shared secret can be used to overload the buffer, and cause a denial of service.

If the shared secret were accurately guessed, an attacker could get privileges on the target RADIUS client or server. While this is far from a trivial exercise, we note that according to researcher Joshua Hill, "most client and server implementations only allow shared secrets to be input as ASCII strings. There are only 94 different ASCII characters that can be entered from a standard US style keyboard (out of the 256 possible). Many implementations also restrict the total length of the shared secret to 16 characters or less. Both of these restrictions artificially reduce the size of the keyspace that an attacker must search in order to guess the shared secret."

Next up, still following the 3APA3A bulletin, we have improper validation of a vendor-specific attribute. Vendor-specific and user-specific attributes can be passed to the client. If the vendor-specific header contains less than two bytes, it will be calculated as a negative number and a denial of service will result. It is not necessary to know the shared secret to abuse this flaw.

RADIUS is used widely by ISPs and NSPs for remote user authentication, so these issues are likely to affect a large number of admins and a vast heap of equipment and software. It's ubiquitous chiefly because it's embedded in numerous devices such as routers and switches.

3APA3A has a simple tool for testing RADIUS vulnerabilities available here.

CERT has a bulletin listing all equipment and software presently known to be vulnerable, along with links to the vendors, posted here. ®

Security for virtualized datacentres

More from The Register

next story
It's Big, it's Blue... it's simply FABLESS! IBM's chip-free future
Or why the reversal of globalisation ain't gonna 'appen
'Hmm, why CAN'T I run a water pipe through that rack of media servers?'
Leaving Las Vegas for Armenia kludging and Dubai dune bashing
Bitcasa bins $10-a-month Infinite storage offer
Firm cites 'low demand' plus 'abusers'
Facebook slurps 'paste sites' for STOLEN passwords, sprinkles on hash and salt
Zuck's ad empire DOESN'T see details in plain text. Phew!
CAGE MATCH: Microsoft, Dell open co-located bit barns in Oz
Whole new species of XaaS spawning in the antipodes
Microsoft and Dell’s cloud in a box: Instant Azure for the data centre
A less painful way to run Microsoft’s private cloud
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.