Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.59531
Category:Fedora Local Security Checks
Title:Fedora Core 6 FEDORA-2007-499 (freeradius)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to freeradius
announced via advisory FEDORA-2007-499.

The FreeRADIUS Server Project is a high performance and highly configurable
GPL'd free RADIUS server. The server is similar in some respects to
Livingston's 2.0 server. While FreeRADIUS started as a variant of the
Cistron RADIUS server, they don't share a lot in common any more. It now has
many more features than Cistron or Livingston, and is much more configurable.

FreeRADIUS is an Internet authentication daemon, which implements the RADIUS
protocol, as defined in RFC 2865 (and others). It allows Network Access
Servers (NAS boxes) to perform authentication for dial-up users. There are
also RADIUS clients available for Web servers, firewalls, Unix logins, and
more. Using RADIUS allows authentication and authorization for a network to
be centralized, and minimizes the amount of re-configuration which has to be
done when adding or deleting new users.


* Wed May 9 2007 Thomas Woerner 1.1.3-2.fc6
- fixed CVE-2007-2028: EAP-TTLS denial of service
Resolves: rhbz#236248

Solution: Apply the appropriate updates.

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/


This update can be installed with the 'yum' update program. Use 'yum update
package-name' at the command line. For more information, refer to 'Managing
Software with yum,' available at http://fedora.redhat.com/docs/yum/.


http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2007-499

Risk factor : Medium

CVSS Score:
5.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-2028
1018042
http://www.securitytracker.com/id?1018042
2007-0013
http://www.trustix.org/errata/2007/0013/
23466
http://www.securityfocus.com/bid/23466
24849
http://secunia.com/advisories/24849
24907
http://secunia.com/advisories/24907
24917
http://secunia.com/advisories/24917
24996
http://secunia.com/advisories/24996
25201
http://secunia.com/advisories/25201
25220
http://secunia.com/advisories/25220
ADV-2007-1369
http://www.vupen.com/english/advisories/2007/1369
GLSA-200704-14
http://security.gentoo.org/glsa/glsa-200704-14.xml
MDKSA-2007:085
http://www.mandriva.com/security/advisories?name=MDKSA-2007:085
RHSA-2007:0338
http://rhn.redhat.com/errata/RHSA-2007-0338.html
SUSE-SR:2007:010
http://www.novell.com/linux/security/advisories/2007_10_sr.html
http://www.freeradius.org/security.html
oval:org.mitre.oval:def:11156
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11156
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.