Debian Security Advisory DSA 2546-1 (freeradius)

Summary
The remote host is missing an update to freeradius announced via advisory DSA 2546-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202546-1
Insight
Timo Warns discovered that the EAP-TLS handling of freeradius, a high-performance and highly configurable RADIUS server, is not properly performing length checks on user-supplied input before copying to a local stack buffer. As a result, an unauthenticated attacker can exploit this flaw to crash the daemon or execute arbitrary code via crafted certificates. For the stable distribution (squeeze), this problem has been fixed in version 2.1.10+dfsg-2+squeeze1. For the testing distribution (wheezy), this problem has will be fixed soon. For the unstable distribution (sid), this problem has been fixed in version 2.1.12+dfsg-1.1. We recommend that you upgrade your freeradius packages.