Files
postgresql/src
Magnus Hagander 24d446b569 Fix low-risk potential denial of service against RADIUS login.
Corrupt RADIUS responses were treated as errors and not ignored
(which the RFC2865 states they should be). This meant that a
user with unfiltered access to the network of the PostgreSQL
or RADIUS server could send a spoofed RADIUS response
to the PostgreSQL server causing it to reject a valid login,
provided the attacker could also guess (or brute-force) the
correct port number.

Fix is to simply retry the receive in a loop until the timeout
has expired or a valid (signed by the correct RADIUS server)
packet arrives.

Reported by Alan DeKok in bug #5687.
2010-10-15 16:59:12 +02:00
..
2010-09-30 23:46:16 +03:00
2010-10-01 10:28:42 -03:00
2010-10-01 10:28:42 -03:00
2010-10-02 18:40:48 -04:00