Date: Tue, 11 Sep 2012 08:46:31 +0000 (UTC) From: Eygene Ryabinkin <rea@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r304085 - head/security/vuxml Message-ID: <201209110846.q8B8kVFj011141@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: rea Date: Tue Sep 11 08:46:31 2012 New Revision: 304085 URL: http://svn.freebsd.org/changeset/ports/304085 Log: VuXML: document remote code execution in freeRADIUS Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue Sep 11 07:51:07 2012 (r304084) +++ head/security/vuxml/vuln.xml Tue Sep 11 08:46:31 2012 (r304085) @@ -51,6 +51,53 @@ Note: Please add new entries to the beg --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="3bbbe3aa-fbeb-11e1-8bd8-0022156e8794"> + <topic>freeradius -- arbitrary code execution for TLS-based authentication</topic> + <affects> + <package> + <name>freeradius</name> + <range><ge>2.1.10</ge><lt>2.2.0</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>freeRADIUS security team reports:</p> + <blockquote cite="http://freeradius.org/security.html"> + <p>Overflow in EAP-TLS for 2.1.10, 2.1.11 and 2.1.12.</p> + <p>The issue was found by Timo Warns, and communicated to + security@freeradius.org. A sample exploit for the issue was + included in the notification.</p> + <p>The vulnerability was created in commit a368a6f4f4aaf on + August 18, 2010. Vulnerable versions include 2.1.10, 2.1.11, + and 2.1.12. Also anyone running the git "master" branch + after August 18, 2010 is vulnerable.</p> + <p>All sites using TLS-based EAP methods and the above + versions are vulnerable. The only configuration change which + can avoid the issue is to disable EAP-TLS, EAP-TTLS, and + PEAP.</p> + <p>An external attacker can use this vulnerability to + over-write the stack frame of the RADIUS server, and cause + it to crash. In addition, more sophisticated attacks may + gain additional privileges on the system running the RADIUS + server.</p> + <p>This attack does not require local network access to the + RADIUS server. It can be done by an attacker through a WiFi + Access Point, so long as the Access Point is configured to + use 802.1X authentication with the RADIUS server.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2012-3547</cvename> + <url>http://freeradius.org/security.html</url> + <url>http://www.pre-cert.de/advisories/PRE-SA-2012-06.txt</url> + </references> + <dates> + <discovery>2012-09-10</discovery> + <entry>2012-09-11</entry> + </dates> + </vuln> + <vuln vid="c1e5f35e-f93d-11e1-b07f-00235a5f2c9a"> <topic>emacs -- remote code execution vulnerability</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201209110846.q8B8kVFj011141>