version 1.510, 2004/09/16 23:09:48 |
version 1.511, 2004/09/21 16:32:37 |
|
|
<a name="all"></a> |
<a name="all"></a> |
<h3><font color="#e00000">All architectures</font></h3> |
<h3><font color="#e00000">All architectures</font></h3> |
<ul> |
<ul> |
|
<li><a name="radius"></a> |
|
<font color="#009000"><strong>020: SECURITY FIX: September 20, 2004</strong></font><br> |
|
Eilko Bos reported that radius authentication, as implemented by |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=login_radius&apropos=0&sektion=8&manpath=OpenBSD+Current&arch=i386&format=html">login_radius(8)</a>, |
|
was not checking the shared secret used for replies sent by the radius server. |
|
This could allow an attacker to spoof a reply granting access to the |
|
attacker. Note that OpenBSD does not ship with radius authentication enabled. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/020_radius.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
<li><a name="xpm"></a> |
<li><a name="xpm"></a> |
<font color="#009000"><strong>019: SECURITY FIX: September 16, 2004</strong></font><br> |
<font color="#009000"><strong>019: SECURITY FIX: September 16, 2004</strong></font><br> |
Chris Evans reported several flaws (stack and integer overflows) in the |
Chris Evans reported several flaws (stack and integer overflows) in the |