Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.870840
Category:Red Hat Local Security Checks
Title:RedHat Update for freeradius RHSA-2012:1326-01
Summary:The remote host is missing an update for the 'freeradius'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'freeradius'
package(s) announced via the referenced advisory.

Vulnerability Insight:
FreeRADIUS is a high-performance and highly configurable free Remote
Authentication Dial In User Service (RADIUS) server, designed to allow
centralized authentication and authorization for a network.

A buffer overflow flaw was discovered in the way radiusd handled the
expiration date field in X.509 client certificates. A remote attacker could
possibly use this flaw to crash radiusd if it were configured to use the
certificate or TLS tunnelled authentication methods (such as EAP-TLS,
EAP-TTLS, and PEAP). (CVE-2012-3547)

Red Hat would like to thank Timo Warns of PRESENSE Technologies GmbH for
reporting this issue.

Users of FreeRADIUS are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing the
update, radiusd will be restarted automatically.

Affected Software/OS:
freeradius on Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)

Solution:
Please Install the Updated Packages.

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2012-3547
http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html
BugTraq ID: 55483
http://www.securityfocus.com/bid/55483
Bugtraq: 20120910 [PRE-SA-2012-06] FreeRADIUS: Stack Overflow in TLS-based EAP Methods (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2012-09/0043.html
Debian Security Information: DSA-2546 (Google Search)
http://www.debian.org/security/2012/dsa-2546
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090171.html
http://www.mandriva.com/security/advisories?name=MDVSA-2012:159
http://www.pre-cert.de/advisories/PRE-SA-2012-06.txt
http://www.openwall.com/lists/oss-security/2012/09/10/2
http://osvdb.org/85325
RedHat Security Advisories: RHSA-2012:1326
http://rhn.redhat.com/errata/RHSA-2012-1326.html
RedHat Security Advisories: RHSA-2012:1327
http://rhn.redhat.com/errata/RHSA-2012-1327.html
http://www.securitytracker.com/id?1027509
http://secunia.com/advisories/50484
http://secunia.com/advisories/50584
http://secunia.com/advisories/50637
http://secunia.com/advisories/50770
SuSE Security Announcement: openSUSE-SU-2012:1200 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00023.html
http://www.ubuntu.com/usn/USN-1585-1
XForce ISS Database: freeradius-cbtlsverify-bo(78408)
https://exchange.xforce.ibmcloud.com/vulnerabilities/78408
CopyrightCopyright (c) 2012 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.