Lucene search

K
ubuntuUbuntuUSN-3316-1
HistoryJun 07, 2017 - 12:00 a.m.

FreeRADIUS vulnerability

2017-06-0700:00:00
ubuntu.com
34

9.9 High

AI Score

Confidence

High

0.007 Low

EPSS

Percentile

80.2%

Releases

  • Ubuntu 17.04

Packages

  • freeradius - high-performance and highly configurable RADIUS server

Details

Stefan Winter and Luboš Pavlíček discovered that FreeRADIUS incorrectly
handled the TLS session cache. A remote attacker could possibly use this
issue to bypass authentication by resuming an unauthenticated session.

OSVersionArchitecturePackageVersionFilename
Ubuntu17.04noarchfreeradius< 3.0.12+dfsg-4ubuntu1.1UNKNOWN
Ubuntu17.04noarchfreeradius-common< 3.0.12+dfsg-4ubuntu1.1UNKNOWN
Ubuntu17.04noarchfreeradius-config< 3.0.12+dfsg-4ubuntu1.1UNKNOWN
Ubuntu17.04noarchfreeradius-dbgsym< 3.0.12+dfsg-4ubuntu1.1UNKNOWN
Ubuntu17.04noarchfreeradius-dhcp< 3.0.12+dfsg-4ubuntu1.1UNKNOWN
Ubuntu17.04noarchfreeradius-dhcp-dbgsym< 3.0.12+dfsg-4ubuntu1.1UNKNOWN
Ubuntu17.04noarchfreeradius-iodbc< 3.0.12+dfsg-4ubuntu1.1UNKNOWN
Ubuntu17.04noarchfreeradius-iodbc-dbgsym< 3.0.12+dfsg-4ubuntu1.1UNKNOWN
Ubuntu17.04noarchfreeradius-krb5< 3.0.12+dfsg-4ubuntu1.1UNKNOWN
Ubuntu17.04noarchfreeradius-krb5-dbgsym< 3.0.12+dfsg-4ubuntu1.1UNKNOWN
Rows per page:
1-10 of 291