USN-1585-1: FreeRADIUS vulnerability
26 September 2012
FreeRADIUS could be made to crash or run programs if it received specially crafted network traffic.
Releases
Packages
- freeradius - a high-performance and highly configurable RADIUS server
Details
Timo Warns discovered that FreeRADIUS incorrectly handled certain long
timestamps in client certificates. A remote attacker could exploit this
flaw and cause the FreeRADIUS server to crash, resulting in a denial of
service, or possibly execute arbitrary code.
The default compiler options for affected releases should reduce the
vulnerability to a denial of service.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04
Ubuntu 11.10
Ubuntu 11.04
In general, a standard system update will make all the necessary changes.