![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.59531 |
Category: | Fedora Local Security Checks |
Title: | Fedora Core 6 FEDORA-2007-499 (freeradius) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to freeradius announced via advisory FEDORA-2007-499. The FreeRADIUS Server Project is a high performance and highly configurable GPL'd free RADIUS server. The server is similar in some respects to Livingston's 2.0 server. While FreeRADIUS started as a variant of the Cistron RADIUS server, they don't share a lot in common any more. It now has many more features than Cistron or Livingston, and is much more configurable. FreeRADIUS is an Internet authentication daemon, which implements the RADIUS protocol, as defined in RFC 2865 (and others). It allows Network Access Servers (NAS boxes) to perform authentication for dial-up users. There are also RADIUS clients available for Web servers, firewalls, Unix logins, and more. Using RADIUS allows authentication and authorization for a network to be centralized, and minimizes the amount of re-configuration which has to be done when adding or deleting new users. * Wed May 9 2007 Thomas Woerner 1.1.3-2.fc6 - fixed CVE-2007-2028: EAP-TTLS denial of service Resolves: rhbz#236248 Solution: Apply the appropriate updates. This update can be downloaded from: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/ This update can be installed with the 'yum' update program. Use 'yum update package-name' at the command line. For more information, refer to 'Managing Software with yum,' available at http://fedora.redhat.com/docs/yum/. http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2007-499 Risk factor : Medium CVSS Score: 5.0 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2007-2028 1018042 http://www.securitytracker.com/id?1018042 2007-0013 http://www.trustix.org/errata/2007/0013/ 23466 http://www.securityfocus.com/bid/23466 24849 http://secunia.com/advisories/24849 24907 http://secunia.com/advisories/24907 24917 http://secunia.com/advisories/24917 24996 http://secunia.com/advisories/24996 25201 http://secunia.com/advisories/25201 25220 http://secunia.com/advisories/25220 ADV-2007-1369 http://www.vupen.com/english/advisories/2007/1369 GLSA-200704-14 http://security.gentoo.org/glsa/glsa-200704-14.xml MDKSA-2007:085 http://www.mandriva.com/security/advisories?name=MDKSA-2007:085 RHSA-2007:0338 http://rhn.redhat.com/errata/RHSA-2007-0338.html SUSE-SR:2007:010 http://www.novell.com/linux/security/advisories/2007_10_sr.html http://www.freeradius.org/security.html oval:org.mitre.oval:def:11156 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11156 |
Copyright | Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |