Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2013-0134

Опубликовано: 11 янв. 2013
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2013-0134: freeradius2 security and bug fix update (LOW)

[2.1.12-5]

  • resolves: bug#855308 CVE-2012-3547 freeradius: Stack-based buffer overflow by processing certain expiration date fields of a certificate during x509 certificate validation

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

freeradius2

2.1.12-5.el5

freeradius2-krb5

2.1.12-5.el5

freeradius2-ldap

2.1.12-5.el5

freeradius2-mysql

2.1.12-5.el5

freeradius2-perl

2.1.12-5.el5

freeradius2-postgresql

2.1.12-5.el5

freeradius2-python

2.1.12-5.el5

freeradius2-unixODBC

2.1.12-5.el5

freeradius2-utils

2.1.12-5.el5

Oracle Linux x86_64

freeradius2

2.1.12-5.el5

freeradius2-krb5

2.1.12-5.el5

freeradius2-ldap

2.1.12-5.el5

freeradius2-mysql

2.1.12-5.el5

freeradius2-perl

2.1.12-5.el5

freeradius2-postgresql

2.1.12-5.el5

freeradius2-python

2.1.12-5.el5

freeradius2-unixODBC

2.1.12-5.el5

freeradius2-utils

2.1.12-5.el5

Oracle Linux i386

freeradius2

2.1.12-5.el5

freeradius2-krb5

2.1.12-5.el5

freeradius2-ldap

2.1.12-5.el5

freeradius2-mysql

2.1.12-5.el5

freeradius2-perl

2.1.12-5.el5

freeradius2-postgresql

2.1.12-5.el5

freeradius2-python

2.1.12-5.el5

freeradius2-unixODBC

2.1.12-5.el5

freeradius2-utils

2.1.12-5.el5

Связанные CVE

Связанные уязвимости

ubuntu
больше 12 лет назад

modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.

redhat
почти 14 лет назад

modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.

nvd
больше 12 лет назад

modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.

debian
больше 12 лет назад

modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode ...

github
больше 3 лет назад

modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.