phorced access <[EMAIL PROTECTED]> wrote:
> On a packetstorm mirrior this weekend I saw a new RADIUS test package.
>  Downloaded it and noticed there were scripts for exploiting
> vulnerabilities with FreeRADIUS.

  They're not exploits, so much as remote crashes.

>  Has anyone looked into this package and what is the FreeRADIUS team
> doing to fix the issues with 1.0 as listed in the exploit.

  The fixes are in the CVS head, and will be in 1.0.1.

  The people who released the vulnerability are unethical and
unprofessional.  They made *zero* attempt to contact us before
releasing their software.

  I have little respect for such behavior.

  Alan DeKok.

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to