Ubuntu 10.04 LTS / 12.04 LTS / 12.10 / 13.10 : freeradius vulnerabilities (USN-2122-1)

Ubuntu Security Notice (C) 2014-2015 Canonical, Inc. / NASL script (C) 2014-2015 Tenable Network Security, Inc.

Synopsis :

The remote Ubuntu host is missing a security-related patch.

Description :

It was discovered that FreeRADIUS incorrectly handled unix
authentication. A remote user could successfully authenticate with an
expired password. (CVE-2011-4966)

Pierre Carrier discovered that FreeRADIUS incorrectly handled rlm_pap
hash processing. An authenticated user could use this issue to cause
FreeRADIUS to crash, resulting in a denial of service, or possibly
execute arbitrary code. The default compiler options for affected
releases should reduce the vulnerability to a denial of service.

Solution :

Update the affected freeradius package.

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 5.5
Public Exploit Available : false

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 72719 ()

Bugtraq ID:

CVE ID: CVE-2011-4966