USN-1585-1: FreeRADIUS vulnerability

Ubuntu Security Notice USN-1585-1

26th September, 2012

freeradius vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 12.04 LTS
  • Ubuntu 11.10
  • Ubuntu 11.04

Summary

FreeRADIUS could be made to crash or run programs if it received specially crafted network traffic.

Software description

  • freeradius - a high-performance and highly configurable RADIUS server

Details

Timo Warns discovered that FreeRADIUS incorrectly handled certain long
timestamps in client certificates. A remote attacker could exploit this
flaw and cause the FreeRADIUS server to crash, resulting in a denial of
service, or possibly execute arbitrary code.

The default compiler options for affected releases should reduce the
vulnerability to a denial of service.

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 12.04 LTS:
freeradius 2.1.10+dfsg-3ubuntu0.12.04.1
Ubuntu 11.10:
freeradius 2.1.10+dfsg-3ubuntu0.11.10.1
Ubuntu 11.04:
freeradius 2.1.10+dfsg-2ubuntu2.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2012-3547