Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.877215
Category:Fedora Local Security Checks
Title:Fedora Update for freeradius FEDORA-2019-ca0f5e835d
Summary:The remote host is missing an update for the 'freeradius'; package(s) announced via the FEDORA-2019-ca0f5e835d advisory.
Description:Summary:
The remote host is missing an update for the 'freeradius'
package(s) announced via the FEDORA-2019-ca0f5e835d advisory.

Vulnerability Insight:
The FreeRADIUS Server Project is a high performance and highly configurable
GPL', d free RADIUS server. The server is similar in some respects to
Livingston', s 2.0 server. While FreeRADIUS started as a variant of the
Cistron RADIUS server, they don', t share a lot in common any more. It now has
many more features than Cistron or Livingston, and is much more configurable.

FreeRADIUS is an Internet authentication daemon, which implements the RADIUS
protocol, as defined in RFC 2865 (and others). It allows Network Access
Servers (NAS boxes) to perform authentication for dial-up users. There are
also RADIUS clients available for Web servers, firewalls, Unix logins, and
more. Using RADIUS allows authentication and authorization for a network to
be centralized, and minimizes the amount of re-configuration which has to be
done when adding or deleting new users.

Affected Software/OS:
'freeradius' package(s) on Fedora 31.

Solution:
Please install the updated package(s).

CVSS Score:
2.9

CVSS Vector:
AV:A/AC:M/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2019-13456
https://bugzilla.redhat.com/show_bug.cgi?id=1737663
https://freeradius.org/security/
https://wpa3.mathyvanhoef.com
SuSE Security Announcement: openSUSE-SU-2020:0553 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00039.html
CopyrightCopyright (C) 2020 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.