Bug 115639 - Security problem on the packed freeradius
Security problem on the packed freeradius
Product: Fedora
Classification: Fedora
Component: freeradius (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Thomas Woerner
: Security
Depends On:
  Show dependency treegraph
Reported: 2004-02-13 20:56 EST by Need Real Name
Modified: 2007-11-30 17:10 EST (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2004-02-17 03:50:06 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Need Real Name 2004-02-13 20:56:35 EST
From Bugzilla Helper:
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET 
CLR 1.1.4322)

Description of problem:
Freeradius-0.9.3, This version corrects a flaw in 0.9.2 (and all 
earlier versions of the server) which may allow an attacker to DoS 
the server. The bug does not look to be easily exploitable, as it 
overwrites the heap (not the stack), and any exploit code must be in 
the form of a valid RADIUS packet. 

As you can see this e really old and public security flaw, RHEL 3 
already correct this package but what about Fedora????. This is 
security related, and very old...

Version-Release number of selected component (if applicable):

How reproducible:

Steps to Reproduce:
1.Install Fedora

Additional info:
Comment 1 Thomas Woerner 2004-02-17 03:50:06 EST
Fixed in rpm freeradius-0.9.3-1.1.

Note You need to log in before you can comment on or make changes to this bug.