TITLE: SUSE update for freeradius SECUNIA ADVISORY ID: SA19405 VERIFY ADVISORY: http://secunia.com/advisories/19405/ CRITICAL: Less critical IMPACT: Security Bypass, DoS WHERE: >From local network OPERATING SYSTEM: SUSE Linux 10 http://secunia.com/product/6221/ SuSE Linux 9.1 http://secunia.com/product/3473/ SUSE Linux 9.2 http://secunia.com/product/4258/ SUSE Linux 9.3 http://secunia.com/product/4933/ SUSE Linux Enterprise Server 9 http://secunia.com/product/4118/ DESCRIPTION: SUSE has issued an update for freeradius. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and to bypass certain security restrictions. For more information: SA19300 SOLUTION: Apply updated packages. -- x86 Platform -- SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/freeradius-1.0.4-4.2.i586.rpm 83c50d73afb03719528c847424179d54 SUSE LINUX 9.3: ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/freeradius-1.0.2-5.7.i586.rpm 0bdb0b07c252fc2a6014f30a3898c4e9 SUSE LINUX 9.2: ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/freeradius-1.0.0-5.8.i586.rpm e28918518daba17fb32685179b3cee20 SUSE LINUX 9.1: ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/freeradius-1.0.5-2.14.i586.rpm 9dcb23e71a735ce675f349f673c5441e -- Power PC Platform -- SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/freeradius-1.0.4-4.2.ppc.rpm 7a4dc1e235c9f9dee719b1350044940f -- x86-64 Platform -- SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/freeradius-1.0.4-4.2.x86_64.rpm 998a259dc0adf00b33bd78807785aaae SUSE LINUX 9.3: ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/freeradius-1.0.2-5.7.x86_64.rpm c73ebda9ead7bc7fa97bc3de2886350f SUSE LINUX 9.2: ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/freeradius-1.0.0-5.8.x86_64.rpm a60e2a98d954a9505dfba503ec0351c5 SUSE LINUX 9.1: ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/freeradius-1.0.5-2.14.x86_64.rpm d02d45273ed3f2c58f5fd014f80efef6 -- Sources -- SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/freeradius-1.0.4-4.2.src.rpm 0eee0bad3d082a2abe180744296e4826 SUSE LINUX 9.3: ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/freeradius-1.0.2-5.7.src.rpm 0992254448350dce633cdac1f3ec4349 SUSE LINUX 9.2: ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/freeradius-1.0.0-5.8.src.rpm 88142a6e271d6319d2cc86745399a578 SUSE LINUX 9.1: ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/freeradius-1.0.5-2.14.src.rpm 5f75a329ee103fbb59e51d6b5a883d87 ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/freeradius-1.0.5-2.14.src.rpm b96eadb419be2b7288e48d6b58ea7e0b ORIGINAL ADVISORY: http://lists.suse.de/archive/suse-security-announce/2006-Mar/0009.html OTHER REFERENCES: SA19300: http://secunia.com/advisories/19300/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------