==========================================================================
Ubuntu Security Notice USN-2122-1
February 26, 2014
freeradius vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 13.10
– Ubuntu 12.10
– Ubuntu 12.04 LTS
– Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in FreeRADIUS.
Software Description:
– freeradius: high-performance and highly configurable RADIUS server
Details:
It was discovered that FreeRADIUS incorrectly handled unix authentication.
A remote user could successfully authenticate with an expired password.
(CVE-2011-4966)
Pierre Carrier discovered that FreeRADIUS incorrectly handled rlm_pap
hash processing. An authenticated user could use this issue to cause
FreeRADIUS to crash, resulting in a denial of service, or possibly execute
arbitrary code. The default compiler options for affected releases should
reduce the vulnerability to a denial of service. (CVE-2014-2015)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 13.10:
freeradius 2.1.12+dfsg-1.2ubuntu5.1
Ubuntu 12.10:
freeradius 2.1.12+dfsg-1.1ubuntu0.1
Ubuntu 12.04 LTS:
freeradius 2.1.10+dfsg-3ubuntu0.12.04.2
Ubuntu 10.04 LTS:
freeradius 2.1.8+dfsg-1ubuntu1.1
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2122-1
CVE-2011-4966, CVE-2014-2015
Package Information:
https://launchpad.net/ubuntu/+source/freeradius/2.1.12+dfsg-1.2ubuntu5.1
https://launchpad.net/ubuntu/+source/freeradius/2.1.12+dfsg-1.1ubuntu0.1
https://launchpad.net/ubuntu/+source/freeradius/2.1.10+dfsg-3ubuntu0.12.04.2
https://launchpad.net/ubuntu/+source/freeradius/2.1.8+dfsg-1ubuntu1.1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/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=a09R
—–END PGP SIGNATURE—–
—