Several problems have been discovered in freeradius, a high-performance and highly configurable RADIUS server. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2005-4744 SuSE researchers have discovered several off-by-one errors may allow remote attackers to cause a denial of service and possibly execute arbitrary code. CVE-2006-1354 Due to insufficient input validation it is possible for a remote attacker to bypass authentication or cause a denial of service. The old stable distribution (woody) does not contain this package. For the stable distribution (sarge) this problem has been fixed in version 1.0.2-4sarge1. For the unstable distribution (sid) this problem has been fixed in version 1.1.0-1.2. We recommend that you upgrade your freeradius package.
Several problems have been discovered in freeradius, a high-performance and highly configurable RADIUS server. The Common Vulnerabilities and Exposures project identifies the following problems:
SuSE researchers have discovered several off-by-one errors may allow remote attackers to cause a denial of service and possibly execute arbitrary code.
Due to insufficient input validation it is possible for a remote attacker to bypass authentication or cause a denial of service.
The old stable distribution (woody) does not contain this package.
For the stable distribution (sarge) this problem has been fixed in version 1.0.2-4sarge1.
For the unstable distribution (sid) this problem has been fixed in version 1.1.0-1.2.
We recommend that you upgrade your freeradius package.
MD5 checksums of the listed files are available in the original advisory.