[gentoo-commits] gentoo commit in xml/htdocs/security/en/glsa: glsa-201406-12.xml

2014-06-14 Thread Chris Reffett (creffett)
creffett14/06/15 00:16:06

  Added:glsa-201406-12.xml
  Log:
  GLSA 201406-12

Revision  ChangesPath
1.1  xml/htdocs/security/en/glsa/glsa-201406-12.xml

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201406-12.xml?rev=1.1&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201406-12.xml?rev=1.1&content-type=text/plain

Index: glsa-201406-12.xml
===



http://www.gentoo.org/dtd/glsa.dtd";>

  FreeRADIUS: Arbitrary code execution
  A vulnerability in FreeRADIUS can lead to arbitrary code execution
or Denial of Service by authenticated users.
  
  freeradius
  June 15, 2014
  June 15, 2014: 1
  501754
  remote
  

  2.2.5
  2.2.5

  
  
FreeRADIUS is an open source RADIUS authentication server.
  
  
Large passwords can trigger a stack-based buffer overflow in
  FreeRADIUS’s rlm_pap module when authenticating against an LDAP server.

  
  
An authenticated user could set a specially crafted long password,
  possibly leading to arbitrary code execution or a Denial of Service
  condition.

  
  
There is no known workaround at this time.
  
  
All FreeRADIUS users should upgrade to the latest version:


  # emerge --sync
  # emerge --ask --oneshot --verbose ">=net-dialup/freeradius-2.2.5"


  
  
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2015";>CVE-2014-2015
  
  
BlueKnight
  
  
creffett
  







[gentoo-commits] gentoo commit in xml/htdocs/security/en/glsa: glsa-201406-12.xml

2014-06-14 Thread Chris Reffett (creffett)
creffett14/06/15 00:16:06

  Added:glsa-201406-12.xml
  Log:
  GLSA 201406-12

Revision  ChangesPath
1.1  xml/htdocs/security/en/glsa/glsa-201406-12.xml

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201406-12.xml?rev=1.1&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201406-12.xml?rev=1.1&content-type=text/plain

Index: glsa-201406-12.xml
===



http://www.gentoo.org/dtd/glsa.dtd";>

  FreeRADIUS: Arbitrary code execution
  A vulnerability in FreeRADIUS can lead to arbitrary code execution
or Denial of Service by authenticated users.
  
  freeradius
  June 15, 2014
  June 15, 2014: 1
  501754
  remote
  

  2.2.5
  2.2.5

  
  
FreeRADIUS is an open source RADIUS authentication server.
  
  
Large passwords can trigger a stack-based buffer overflow in
  FreeRADIUS’s rlm_pap module when authenticating against an LDAP server.

  
  
An authenticated user could set a specially crafted long password,
  possibly leading to arbitrary code execution or a Denial of Service
  condition.

  
  
There is no known workaround at this time.
  
  
All FreeRADIUS users should upgrade to the latest version:


  # emerge --sync
  # emerge --ask --oneshot --verbose ">=net-dialup/freeradius-2.2.5"


  
  
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2015";>CVE-2014-2015
  
  
BlueKnight
  
  
creffett
  







[gentoo-commits] gentoo commit in xml/htdocs/security/en/glsa: glsa-201406-12.xml

2014-06-14 Thread Chris Reffett (creffett)
creffett14/06/15 00:16:06

  Added:glsa-201406-12.xml
  Log:
  GLSA 201406-12

Revision  ChangesPath
1.1  xml/htdocs/security/en/glsa/glsa-201406-12.xml

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201406-12.xml?rev=1.1&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201406-12.xml?rev=1.1&content-type=text/plain

Index: glsa-201406-12.xml
===



http://www.gentoo.org/dtd/glsa.dtd";>

  FreeRADIUS: Arbitrary code execution
  A vulnerability in FreeRADIUS can lead to arbitrary code execution
or Denial of Service by authenticated users.
  
  freeradius
  June 15, 2014
  June 15, 2014: 1
  501754
  remote
  

  2.2.5
  2.2.5

  
  
FreeRADIUS is an open source RADIUS authentication server.
  
  
Large passwords can trigger a stack-based buffer overflow in
  FreeRADIUS’s rlm_pap module when authenticating against an LDAP server.

  
  
An authenticated user could set a specially crafted long password,
  possibly leading to arbitrary code execution or a Denial of Service
  condition.

  
  
There is no known workaround at this time.
  
  
All FreeRADIUS users should upgrade to the latest version:


  # emerge --sync
  # emerge --ask --oneshot --verbose ">=net-dialup/freeradius-2.2.5"


  
  
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2015";>CVE-2014-2015
  
  
BlueKnight
  
  
creffett
  







[gentoo-commits] gentoo commit in xml/htdocs/security/en/glsa: glsa-201406-12.xml

2014-06-14 Thread Chris Reffett (creffett)
creffett14/06/15 00:16:06

  Added:glsa-201406-12.xml
  Log:
  GLSA 201406-12

Revision  ChangesPath
1.1  xml/htdocs/security/en/glsa/glsa-201406-12.xml

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201406-12.xml?rev=1.1&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201406-12.xml?rev=1.1&content-type=text/plain

Index: glsa-201406-12.xml
===



http://www.gentoo.org/dtd/glsa.dtd";>

  FreeRADIUS: Arbitrary code execution
  A vulnerability in FreeRADIUS can lead to arbitrary code execution
or Denial of Service by authenticated users.
  
  freeradius
  June 15, 2014
  June 15, 2014: 1
  501754
  remote
  

  2.2.5
  2.2.5

  
  
FreeRADIUS is an open source RADIUS authentication server.
  
  
Large passwords can trigger a stack-based buffer overflow in
  FreeRADIUS’s rlm_pap module when authenticating against an LDAP server.

  
  
An authenticated user could set a specially crafted long password,
  possibly leading to arbitrary code execution or a Denial of Service
  condition.

  
  
There is no known workaround at this time.
  
  
All FreeRADIUS users should upgrade to the latest version:


  # emerge --sync
  # emerge --ask --oneshot --verbose ">=net-dialup/freeradius-2.2.5"


  
  
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2015";>CVE-2014-2015
  
  
BlueKnight
  
  
creffett
  







[gentoo-commits] gentoo commit in xml/htdocs/security/en/glsa: glsa-201406-12.xml

2014-06-14 Thread Chris Reffett (creffett)
creffett14/06/15 00:16:06

  Added:glsa-201406-12.xml
  Log:
  GLSA 201406-12

Revision  ChangesPath
1.1  xml/htdocs/security/en/glsa/glsa-201406-12.xml

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201406-12.xml?rev=1.1&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201406-12.xml?rev=1.1&content-type=text/plain

Index: glsa-201406-12.xml
===



http://www.gentoo.org/dtd/glsa.dtd";>

  FreeRADIUS: Arbitrary code execution
  A vulnerability in FreeRADIUS can lead to arbitrary code execution
or Denial of Service by authenticated users.
  
  freeradius
  June 15, 2014
  June 15, 2014: 1
  501754
  remote
  

  2.2.5
  2.2.5

  
  
FreeRADIUS is an open source RADIUS authentication server.
  
  
Large passwords can trigger a stack-based buffer overflow in
  FreeRADIUS’s rlm_pap module when authenticating against an LDAP server.

  
  
An authenticated user could set a specially crafted long password,
  possibly leading to arbitrary code execution or a Denial of Service
  condition.

  
  
There is no known workaround at this time.
  
  
All FreeRADIUS users should upgrade to the latest version:


  # emerge --sync
  # emerge --ask --oneshot --verbose ">=net-dialup/freeradius-2.2.5"


  
  
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2015";>CVE-2014-2015
  
  
BlueKnight
  
  
creffett
  







[gentoo-commits] gentoo commit in xml/htdocs/security/en/glsa: glsa-201406-12.xml

2014-06-14 Thread Chris Reffett (creffett)
creffett14/06/15 00:16:06

  Added:glsa-201406-12.xml
  Log:
  GLSA 201406-12

Revision  ChangesPath
1.1  xml/htdocs/security/en/glsa/glsa-201406-12.xml

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201406-12.xml?rev=1.1&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201406-12.xml?rev=1.1&content-type=text/plain

Index: glsa-201406-12.xml
===



http://www.gentoo.org/dtd/glsa.dtd";>

  FreeRADIUS: Arbitrary code execution
  A vulnerability in FreeRADIUS can lead to arbitrary code execution
or Denial of Service by authenticated users.
  
  freeradius
  June 15, 2014
  June 15, 2014: 1
  501754
  remote
  

  2.2.5
  2.2.5

  
  
FreeRADIUS is an open source RADIUS authentication server.
  
  
Large passwords can trigger a stack-based buffer overflow in
  FreeRADIUS’s rlm_pap module when authenticating against an LDAP server.

  
  
An authenticated user could set a specially crafted long password,
  possibly leading to arbitrary code execution or a Denial of Service
  condition.

  
  
There is no known workaround at this time.
  
  
All FreeRADIUS users should upgrade to the latest version:


  # emerge --sync
  # emerge --ask --oneshot --verbose ">=net-dialup/freeradius-2.2.5"


  
  
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2015";>CVE-2014-2015
  
  
BlueKnight
  
  
creffett