Lucene search

K
centosCentOS ProjectCESA-2012:1327
HistoryOct 03, 2012 - 1:47 a.m.

freeradius2 security update

2012-10-0301:47:30
CentOS Project
lists.centos.org
50

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.063 Low

EPSS

Percentile

93.5%

CentOS Errata and Security Advisory CESA-2012:1327

FreeRADIUS is a high-performance and highly configurable free Remote
Authentication Dial In User Service (RADIUS) server, designed to allow
centralized authentication and authorization for a network.

A buffer overflow flaw was discovered in the way radiusd handled the
expiration date field in X.509 client certificates. A remote attacker could
possibly use this flaw to crash radiusd if it were configured to use the
certificate or TLS tunnelled authentication methods (such as EAP-TLS,
EAP-TTLS, and PEAP). (CVE-2012-3547)

Red Hat would like to thank Timo Warns of PRESENSE Technologies GmbH for
reporting this issue.

Users of FreeRADIUS are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing the
update, radiusd will be restarted automatically.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2012-October/081067.html

Affected packages:
freeradius2
freeradius2-krb5
freeradius2-ldap
freeradius2-mysql
freeradius2-perl
freeradius2-postgresql
freeradius2-python
freeradius2-unixODBC
freeradius2-utils

Upstream details at:
https://access.redhat.com/errata/RHSA-2012:1327

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.063 Low

EPSS

Percentile

93.5%