RADIUS: Username Buffer Overflow

This signature detects attempts to exploit a know vulnerability against RADIUS Authentication Bypass protocol. Attackers can craft an overly long username, which can cause the Authentication, Authorization, and Accounting (AAA) process to bypass authentication. This can lead to a buffer overflow and remote execution of arbitrary code.

Extended Description

Cisco IOS Remote Authentication Dial In User Service (RADIUS) is prone to a remote authentication bypass vulnerability. The issue manifests when Cisco IOS is configured to employ AAA RADIUS authentication and is configured to use 'none' as a fallback method. A remote attacker may exploit this issue to bypass authentication and gain unauthorized access to the affected service.

Affected Products

Cisco ios

Short Name
RADIUS:USR-OF
Severity
Minor
Recommended
False
Recommended Action
None
Category
RADIUS
Keywords
Buffer CVE-2005-2105 Overflow Username bid:14092
Release Date
07/11/2005
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Cisco

CVSS Score

7.5

Found a potential security threat?