RedHat: 'radiusd-cistron' Multiple vulnerabilities
Summary
Summary
The radiusd-cistron package contains a server daemon for the RemoteAuthentication Dial-In User Server (RADIUS) client/server securityprotocol. Various vulnerabilities have been found in CistronRADIUS as well as other RADIUS servers and clients.In versions of Cistron RADIUS 1.6.5 and earlier, malformed packets could beused to gain additional privileges.All users of Cistron RADIUS are advised to upgrade to version 1.6.6, whichis not vulnerable to these issues.Pay special attention to the installation instructions in the Solutionsection as they vary significantly from the usual update method.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is currently not available through Red Hat Network.
Due to a bug in previously released versions, the original package must be
removed, and the new package must be installed to apply this update (as root):
# /sbin/service radiusd stop
# /sbin/chkconfig --del radiusd
# rpm -e --noscripts radiusd-cistron
# rpm -ivh radiusd-cistron-1.6.6-2.[arch].rpm
where [arch] is the architecture.
5. Bug IDs fixed ( for more info):
6. RPMs required:
Red Hat Powertools 7.0:
SRPMS:
alpha:
i386:
Red Hat Powertools 7.1:
SRPMS:
alpha:
i386:
7. Verification:
MD5 sum Package Name
398e46f80c48654b26a2c484e264b485 7.0/en/powertools/SRPMS/radiusd-cistron-1.6.6-2.src.rpm
080c782aeb81f4a0e4dda4e31efbe660 7.0/en/powertools/alpha/radiusd-cistron-1.6.6-2.alpha.rpm
b5c937f5e48d4d3484b64e20f8785b4a 7.0/en/powertools/i386/radiusd-cistron-1.6.6-2.i386.rpm
398e46f80c48654b26a2c484e264b485 7.1/en/powertools/SRPMS/radiusd-cistron-1.6.6-2.src.rpm
080c782aeb81f4a0e4dda4e31efbe660 7.1/en/powertools/alpha/radiusd-cistron-1.6.6-2.alpha.rpm
b5c937f5e48d4d3484b64e20f8785b4a 7.1/en/powertools/i386/radiusd-cistron-1.6.6-2.i386.rpm
These packages are GPG signed by Red Hat, Inc. for security. Our key
is available at:
About
You can verify each package with the following command:
rpm --checksig
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg
Package List
Topic
Topic
Updated radiusd-cistron packages, which fix various security issues, are now
available.
Relevant Releases Architectures
Red Hat Powertools 7.0 - alpha, i386
Red Hat Powertools 7.1 - alpha, i386
Bugs Fixed