---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Fedora update for freeradius SECUNIA ADVISORY ID: SA16590 VERIFY ADVISORY: http://secunia.com/advisories/16590/ CRITICAL: Less critical IMPACT: Manipulation of data, DoS WHERE: >From remote OPERATING SYSTEM: Fedora Core 3 http://secunia.com/product/4222/ DESCRIPTION: Fedora has issued an update for freeradius. This fixes some vulnerabilities, which potentially can be exploited by malicious users to conduct SQL injection attacks or to cause a DoS (Denial of Service). For more information: SA15361 SOLUTION: Apply updated packages. Fedora Core 3: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/ 9962dba5d86ccd7cda65d258c5fc26dd SRPMS/freeradius-1.0.1-2.FC3.1.src.rpm 4560108a586bc70b856f2d92f762184d x86_64/freeradius-1.0.1-2.FC3.1.x86_64.rpm d0f7fb5fdca5e19dfbd2865c43b1372c x86_64/freeradius-mysql-1.0.1-2.FC3.1.x86_64.rpm 3b1ed183ccbe1a551873665dfa47d27b x86_64/freeradius-postgresql-1.0.1-2.FC3.1.x86_64.rpm f774f3e506542a147a9c437fd9827f32 x86_64/freeradius-unixODBC-1.0.1-2.FC3.1.x86_64.rpm 406c64ae72f8dceb89e9feb41d441b29 x86_64/debug/freeradius-debuginfo-1.0.1-2.FC3.1.x86_64.rpm b36869ec31ed8bfc5f65cf661aefc9ac i386/freeradius-1.0.1-2.FC3.1.i386.rpm 11bf8030e7219afe25494be0ee264d79 i386/freeradius-mysql-1.0.1-2.FC3.1.i386.rpm 61a988c6a68de067cd7062e76c09e8f8 i386/freeradius-postgresql-1.0.1-2.FC3.1.i386.rpm b1e62440dc7bbb5754332d451d12c804 i386/freeradius-unixODBC-1.0.1-2.FC3.1.i386.rpm 1dc5d3ee6f3a76fc6e469e41df900bfd i386/debug/freeradius-debuginfo-1.0.1-2.FC3.1.i386.rpm OTHER REFERENCES: SA15361: http://secunia.com/advisories/15361/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------