Summary
The remote host is missing an update to libpam-radius-auth announced via advisory DSA 659-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20659-1
Insight
Two problems have been discovered in the libpam-radius-auth package, the PAM RADIUS authentication module. The Common Vulnerabilities and Exposures Project identifies the following problems:
CVE-2004-1340
The Debian package accidently installed its configuration file /etc/pam_radius_auth.conf world-readable. Since it may possibly contain secrets all local users are able to read them if the administrator hasn't adjusted file permissions. This problem is Debian specific.
CVE-2005-0108
Leon Juranic discoverd an integer underflow in the mod_auth_radius module for Apache which is also present in libpam-radius-auth.
For the stable distribution (woody) these problems have been fixed in version 1.3.14-1.3.
For the unstable distribution (sid) these problems have been fixed in version 1.3.16-3.
We recommend that you upgrade your libpam-radius-auth package.
Severity
Classification
-
CVE CVE-2004-1340, CVE-2005-0108 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:N/A:P
Related Vulnerabilities