[Trisquel-security] [USN-1585-1] FreeRADIUS vulnerability

Marc Deslauriers marc.deslauriers at canonical.com
Wed Sep 26 16:44:51 CEST 2012

Ubuntu Security Notice USN-1585-1
September 26, 2012

freeradius vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 11.04


FreeRADIUS could be made to crash or run programs if it received
specially crafted network traffic.

Software Description:
- freeradius: a high-performance and highly configurable RADIUS server


Timo Warns discovered that FreeRADIUS incorrectly handled certain long
timestamps in client certificates. A remote attacker could exploit this
flaw and cause the FreeRADIUS server to crash, resulting in a denial of
service, or possibly execute arbitrary code.

The default compiler options for affected releases should reduce the
vulnerability to a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
  freeradius                      2.1.10+dfsg-3ubuntu0.12.04.1

Ubuntu 11.10:
  freeradius                      2.1.10+dfsg-3ubuntu0.11.10.1

Ubuntu 11.04:
  freeradius                      2.1.10+dfsg-2ubuntu2.1

In general, a standard system update will make all the necessary changes.


Package Information:



-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 897 bytes
Desc: OpenPGP digital signature
URL: <http://listas.trisquel.info/pipermail/trisquel-security/attachments/20120926/94f3cd42/attachment.pgp>
-------------- next part --------------
ubuntu-security-announce mailing list
ubuntu-security-announce at lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

More information about the Trisquel-security mailing list