freeradius vulnerability

Related Vulnerabilities: CVE-2012-3547  

FreeRADIUS could be made to crash or run programs if it received specially crafted network traffic.

Timo Warns discovered that FreeRADIUS incorrectly handled certain long timestamps in client certificates. A remote attacker could exploit this flaw and cause the FreeRADIUS server to crash, resulting in a denial of service, or possibly execute arbitrary code.

26 September 2012

freeradius vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 12.04 LTS
  • Ubuntu 11.10
  • Ubuntu 11.04

Summary

FreeRADIUS could be made to crash or run programs if it received specially crafted network traffic.

Software Description

  • freeradius - a high-performance and highly configurable RADIUS server

Details

Timo Warns discovered that FreeRADIUS incorrectly handled certain long timestamps in client certificates. A remote attacker could exploit this flaw and cause the FreeRADIUS server to crash, resulting in a denial of service, or possibly execute arbitrary code.

The default compiler options for affected releases should reduce the vulnerability to a denial of service.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.04 LTS
freeradius - 2.1.10+dfsg-3ubuntu0.12.04.1
Ubuntu 11.10
freeradius - 2.1.10+dfsg-3ubuntu0.11.10.1
Ubuntu 11.04
freeradius - 2.1.10+dfsg-2ubuntu2.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References