Ubuntu alert USN-1585-1 (freeradius)
From: | Marc Deslauriers <marc.deslauriers@canonical.com> | |
To: | ubuntu-security-announce@lists.ubuntu.com | |
Subject: | [USN-1585-1] FreeRADIUS vulnerability | |
Date: | Wed, 26 Sep 2012 10:44:51 -0400 | |
Message-ID: | <506314E3.3060601@canonical.com> |
========================================================================== Ubuntu Security Notice USN-1585-1 September 26, 2012 freeradius vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 LTS - Ubuntu 11.10 - Ubuntu 11.04 Summary: FreeRADIUS could be made to crash or run programs if it received specially crafted network traffic. Software Description: - freeradius: a high-performance and highly configurable RADIUS server Details: Timo Warns discovered that FreeRADIUS incorrectly handled certain long timestamps in client certificates. A remote attacker could exploit this flaw and cause the FreeRADIUS server to crash, resulting in a denial of service, or possibly execute arbitrary code. The default compiler options for affected releases should reduce the vulnerability to a denial of service. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 LTS: freeradius 2.1.10+dfsg-3ubuntu0.12.04.1 Ubuntu 11.10: freeradius 2.1.10+dfsg-3ubuntu0.11.10.1 Ubuntu 11.04: freeradius 2.1.10+dfsg-2ubuntu2.1 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-1585-1 CVE-2012-3547 Package Information: https://launchpad.net/ubuntu/+source/freeradius/2.1.10+df... https://launchpad.net/ubuntu/+source/freeradius/2.1.10+df... https://launchpad.net/ubuntu/+source/freeradius/2.1.10+df... -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...