ALAS-2012-131


Amazon Linux AMI Security Advisory: ALAS-2012-131
Advisory Release Date: 2014-09-14 17:07 Pacific
Severity: Medium

Issue Overview:

A buffer overflow flaw was discovered in the way radiusd handled the expiration date field in X.509 client certificates. A remote attacker could possibly use this flaw to crash radiusd if it were configured to use the certificate or TLS tunnelled authentication methods (such as EAP-TLS, EAP-TTLS, and PEAP). (CVE-2012-3547 )


Affected Packages:

freeradius


Issue Correction:
Run yum update freeradius to update your system.

New Packages:
i686:
    freeradius-perl-2.1.12-4.11.amzn1.i686
    freeradius-utils-2.1.12-4.11.amzn1.i686
    freeradius-ldap-2.1.12-4.11.amzn1.i686
    freeradius-unixODBC-2.1.12-4.11.amzn1.i686
    freeradius-postgresql-2.1.12-4.11.amzn1.i686
    freeradius-python-2.1.12-4.11.amzn1.i686
    freeradius-mysql-2.1.12-4.11.amzn1.i686
    freeradius-2.1.12-4.11.amzn1.i686
    freeradius-krb5-2.1.12-4.11.amzn1.i686
    freeradius-debuginfo-2.1.12-4.11.amzn1.i686

src:
    freeradius-2.1.12-4.11.amzn1.src

x86_64:
    freeradius-postgresql-2.1.12-4.11.amzn1.x86_64
    freeradius-mysql-2.1.12-4.11.amzn1.x86_64
    freeradius-ldap-2.1.12-4.11.amzn1.x86_64
    freeradius-debuginfo-2.1.12-4.11.amzn1.x86_64
    freeradius-unixODBC-2.1.12-4.11.amzn1.x86_64
    freeradius-utils-2.1.12-4.11.amzn1.x86_64
    freeradius-perl-2.1.12-4.11.amzn1.x86_64
    freeradius-krb5-2.1.12-4.11.amzn1.x86_64
    freeradius-python-2.1.12-4.11.amzn1.x86_64
    freeradius-2.1.12-4.11.amzn1.x86_64