exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 36765

Secunia Security Advisory 36765
Posted Sep 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for freeradius. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, ubuntu
SHA-256 | 5b189b47900737b90c25cd41056ec1452c719417cbacbd8bb24240c33d935b3b

Secunia Security Advisory 36765

Change Mirror Download
----------------------------------------------------------------------

Do you have VARM strategy implemented?

(Vulnerability Assessment Remediation Management)

If not, then implement it through the most reliable vulnerability
intelligence source on the market.

Implement it through Secunia.

For more information visit:
http://secunia.com/advisories/business_solutions/

Alternatively request a call from a Secunia representative today to
discuss how we can help you with our capabilities contact us at:
sales@secunia.com

----------------------------------------------------------------------

TITLE:
Ubuntu update for freeradius

SECUNIA ADVISORY ID:
SA36765

VERIFY ADVISORY:
http://secunia.com/advisories/36765/

DESCRIPTION:
Ubuntu has issued an update for freeradius. This fixes a
vulnerability, which can be exploited by malicious people to cause a
DoS (Denial of Service).

For more information:
SA36676

SOLUTION:
Apply updated packages.

-- Ubuntu 8.04 LTS --

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/f/freeradius/freeradius_1.1.7-1ubuntu0.2.diff.gz
Size/MD5: 29420 24046205ce4000d6936fffda082f1c56
http://security.ubuntu.com/ubuntu/pool/main/f/freeradius/freeradius_1.1.7-1ubuntu0.2.dsc
Size/MD5: 1089 f48ac81f667771d7867602f012de0ae1
http://security.ubuntu.com/ubuntu/pool/main/f/freeradius/freeradius_1.1.7.orig.tar.gz
Size/MD5: 2673548 4bbdb04b5778b0703e62edb51fdf3e01

Architecture independent packages:

http://security.ubuntu.com/ubuntu/pool/main/f/freeradius/freeradius-dialupadmin_1.1.7-1ubuntu0.2_all.deb
Size/MD5: 116132 0c597d55be61f8eb86218545a97a1909

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/f/freeradius/freeradius-dbg_1.1.7-1ubuntu0.2_amd64.deb
Size/MD5: 655586 a5d8de1ce68ec51a637e5fbcb803db6c
http://security.ubuntu.com/ubuntu/pool/main/f/freeradius/freeradius-iodbc_1.1.7-1ubuntu0.2_amd64.deb
Size/MD5: 35026 d3518140284d52145cd4b7af58061dba
http://security.ubuntu.com/ubuntu/pool/main/f/freeradius/freeradius-krb5_1.1.7-1ubuntu0.2_amd64.deb
Size/MD5: 35526 269e282963da95f8bf0fb6ebd13ebe59
http://security.ubuntu.com/ubuntu/pool/main/f/freeradius/freeradius-ldap_1.1.7-1ubuntu0.2_amd64.deb
Size/MD5: 52338 2e7a50a19cb73bacdb6ce2980aaeeef8
http://security.ubuntu.com/ubuntu/pool/main/f/freeradius/freeradius-mysql_1.1.7-1ubuntu0.2_amd64.deb
Size/MD5: 35310 9934a770a60b6e0bb27884b13ad65fad
http://security.ubuntu.com/ubuntu/pool/main/f/freeradius/freeradius-postgresql_1.1.7-1ubuntu0.2_amd64.deb
Size/MD5: 35398 dc0c40b8264b720a6a7a0ff2e84ecdc1
http://security.ubuntu.com/ubuntu/pool/main/f/freeradius/freeradius_1.1.7-1ubuntu0.2_amd64.deb
Size/MD5: 797758 d64c394fe55cd69b6ac5d72143f75187

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/f/freeradius/freeradius-dbg_1.1.7-1ubuntu0.2_i386.deb
Size/MD5: 606818 a6c2dc55d5ba7608abb6eed82acfcc1e
http://security.ubuntu.com/ubuntu/pool/main/f/freeradius/freeradius-iodbc_1.1.7-1ubuntu0.2_i386.deb
Size/MD5: 34594 b9cbc077759d123b38f40b5fcc591ac6
http://security.ubuntu.com/ubuntu/pool/main/f/freeradius/freeradius-krb5_1.1.7-1ubuntu0.2_i386.deb
Size/MD5: 35276 7e3fb463c80e7fbaa8ef8b80e008ef30
http://security.ubuntu.com/ubuntu/pool/main/f/freeradius/freeradius-ldap_1.1.7-1ubuntu0.2_i386.deb
Size/MD5: 51824 80688022b2a0b66420dd8455844e369c
http://security.ubuntu.com/ubuntu/pool/main/f/freeradius/freeradius-mysql_1.1.7-1ubuntu0.2_i386.deb
Size/MD5: 34838 b9da2e5a7b74b24d5914c8e55c258a7d
http://security.ubuntu.com/ubuntu/pool/main/f/freeradius/freeradius-postgresql_1.1.7-1ubuntu0.2_i386.deb
Size/MD5: 34956 8dbb9423504cc0f6d3c0fd7ded42819d
http://security.ubuntu.com/ubuntu/pool/main/f/freeradius/freeradius_1.1.7-1ubuntu0.2_i386.deb
Size/MD5: 768668 c6c7869016c18ab096c5a6c303ee4639

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/f/freeradius/freeradius-dbg_1.1.7-1ubuntu0.2_lpia.deb
Size/MD5: 616284 5c6e1f2aa8c06c4caa8d5ca35661c317
http://ports.ubuntu.com/pool/main/f/freeradius/freeradius-iodbc_1.1.7-1ubuntu0.2_lpia.deb
Size/MD5: 34430 b8621d65be2cefe3860ec5075f4c0807
http://ports.ubuntu.com/pool/main/f/freeradius/freeradius-krb5_1.1.7-1ubuntu0.2_lpia.deb
Size/MD5: 35238 13f31fff6a5e77e9784c3396eea9a811
http://ports.ubuntu.com/pool/main/f/freeradius/freeradius-ldap_1.1.7-1ubuntu0.2_lpia.deb
Size/MD5: 51932 ab7fd210c158808b29d7bf253d79ba63
http://ports.ubuntu.com/pool/main/f/freeradius/freeradius-mysql_1.1.7-1ubuntu0.2_lpia.deb
Size/MD5: 34750 078e6c6e37906da714259410bf22d005
http://ports.ubuntu.com/pool/main/f/freeradius/freeradius-postgresql_1.1.7-1ubuntu0.2_lpia.deb
Size/MD5: 34964 2b3eb937c8e0fbe4bd38ebcdf5de597f
http://ports.ubuntu.com/pool/main/f/freeradius/freeradius_1.1.7-1ubuntu0.2_lpia.deb
Size/MD5: 767560 5651ba8b7338f081d84d5b7d0ef3acdd

powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/f/freeradius/freeradius-dbg_1.1.7-1ubuntu0.2_powerpc.deb
Size/MD5: 668716 e3aabf2b75986af97aaeaad49c485151
http://ports.ubuntu.com/pool/main/f/freeradius/freeradius-iodbc_1.1.7-1ubuntu0.2_powerpc.deb
Size/MD5: 37088 067bdcd108ae7d6094a2321fb9ace73a
http://ports.ubuntu.com/pool/main/f/freeradius/freeradius-krb5_1.1.7-1ubuntu0.2_powerpc.deb
Size/MD5: 37706 ea32be50c41a6412d902e84f85e1b269
http://ports.ubuntu.com/pool/main/f/freeradius/freeradius-ldap_1.1.7-1ubuntu0.2_powerpc.deb
Size/MD5: 54942 71d39cb3d82eb6bbed160cba2cacb221
http://ports.ubuntu.com/pool/main/f/freeradius/freeradius-mysql_1.1.7-1ubuntu0.2_powerpc.deb
Size/MD5: 37348 1e556e8a696bf60860499313a72d84b2
http://ports.ubuntu.com/pool/main/f/freeradius/freeradius-postgresql_1.1.7-1ubuntu0.2_powerpc.deb
Size/MD5: 37520 ae55203e58c7e00efbf2c333a6764c20
http://ports.ubuntu.com/pool/main/f/freeradius/freeradius_1.1.7-1ubuntu0.2_powerpc.deb
Size/MD5: 865766 d5f02a2bde7b7da25d08fbd513b9b9ed

sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/f/freeradius/freeradius-dbg_1.1.7-1ubuntu0.2_sparc.deb
Size/MD5: 578502 e5d53135829d6b7fc1a971d5d066da67
http://ports.ubuntu.com/pool/main/f/freeradius/freeradius-iodbc_1.1.7-1ubuntu0.2_sparc.deb
Size/MD5: 34366 9ed3c394b2dcb0541ebc88dceeb7e16d
http://ports.ubuntu.com/pool/main/f/freeradius/freeradius-krb5_1.1.7-1ubuntu0.2_sparc.deb
Size/MD5: 35212 729794ada8ceaa58d66b957105ba7108
http://ports.ubuntu.com/pool/main/f/freeradius/freeradius-ldap_1.1.7-1ubuntu0.2_sparc.deb
Size/MD5: 51208 ae2993659065f694259ca27aaa9517b4
http://ports.ubuntu.com/pool/main/f/freeradius/freeradius-mysql_1.1.7-1ubuntu0.2_sparc.deb
Size/MD5: 34682 10345506d4f5f881824cd3936c050e7a
http://ports.ubuntu.com/pool/main/f/freeradius/freeradius-postgresql_1.1.7-1ubuntu0.2_sparc.deb
Size/MD5: 34796 2cb01627453736d36bb96d158231fdf7
http://ports.ubuntu.com/pool/main/f/freeradius/freeradius_1.1.7-1ubuntu0.2_sparc.deb
Size/MD5: 772458 e954a14e2dbd7182eef2484463cdd13f

ORIGINAL ADVISORY:
USN-832-1:
http://www.ubuntu.com/usn/USN-832-1

OTHER REFERENCES:
SA36676:
http://secunia.com/advisories/36676/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close