You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa freeradius

Sigurnosni nedostaci programskog paketa freeradius

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2122-1
February 26, 2014

freeradius vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 13.10
– Ubuntu 12.10
– Ubuntu 12.04 LTS
– Ubuntu 10.04 LTS

Summary:

Several security issues were fixed in FreeRADIUS.

Software Description:
– freeradius: high-performance and highly configurable RADIUS server

Details:

It was discovered that FreeRADIUS incorrectly handled unix authentication.
A remote user could successfully authenticate with an expired password.
(CVE-2011-4966)

Pierre Carrier discovered that FreeRADIUS incorrectly handled rlm_pap
hash processing. An authenticated user could use this issue to cause
FreeRADIUS to crash, resulting in a denial of service, or possibly execute
arbitrary code. The default compiler options for affected releases should
reduce the vulnerability to a denial of service. (CVE-2014-2015)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 13.10:
freeradius 2.1.12+dfsg-1.2ubuntu5.1

Ubuntu 12.10:
freeradius 2.1.12+dfsg-1.1ubuntu0.1

Ubuntu 12.04 LTS:
freeradius 2.1.10+dfsg-3ubuntu0.12.04.2

Ubuntu 10.04 LTS:
freeradius 2.1.8+dfsg-1ubuntu1.1

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2122-1
CVE-2011-4966, CVE-2014-2015

Package Information:
https://launchpad.net/ubuntu/+source/freeradius/2.1.12+dfsg-1.2ubuntu5.1
https://launchpad.net/ubuntu/+source/freeradius/2.1.12+dfsg-1.1ubuntu0.1
https://launchpad.net/ubuntu/+source/freeradius/2.1.10+dfsg-3ubuntu0.12.04.2
https://launchpad.net/ubuntu/+source/freeradius/2.1.8+dfsg-1ubuntu1.1

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/
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=a09R
—–END PGP SIGNATURE—–

AutorMarijo Plepelic
Cert idNCERT-REF-2014-02-0015-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni propust programskog paketa pidgin-knotify

Otkriven je sigurnosni propust u programskom paketu pidgin-knotify za operacijski sustav Gentoo. Otkriveni propust potencijalnim napadačima omogućuje izvršavanje proizvoljnog programskog...

Close