|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for freeradius RHSA-2017:1581-01|
|Summary:||The remote host is missing an update for the 'freeradius'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'freeradius'
package(s) announced via the referenced advisory.
FreeRADIUS is a high-performance and highly
configurable free Remote Authentication Dial In User Service (RADIUS) server,
designed to allow centralized authentication and authorization for a network.
Security Fix(es): * An authentication bypass flaw was found in the way the EAP
module in FreeRADIUS handled TLS session resumption. A remote unauthenticated
attacker could potentially use this flaw to bypass the inner authentication
check in FreeRADIUS by resuming an older unauthenticated TLS session.
freeradius on Red Hat Enterprise Linux Server (v. 7)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2017-9148|
BugTraq ID: 98734
RedHat Security Advisories: RHSA-2017:1581
|Copyright||Copyright (C) 2017 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.