Novell is now a part of Micro Focus

Security update for freeradius


(Last modified: 27MAR2006)

solutions Security update for freeradius SuSE Linux Maintenance Web (3abbe09e8dae9ddc47532f7d512ed52b)

Applies to

Package: freeradius
Product(s): SUSE CORE 9 for x86
SUSE CORE 9 for Itanium Processor Family
SUSE CORE 9 for IBM S/390 31bit
SUSE CORE 9 for IBM zSeries 64bit
SUSE CORE 9 for AMD64 and Intel EM64T
Novell Linux POS 9
Open Enterprise Server
Patch: patch-10924
Release: 20060327
Obsoletes: none


Install this update if you are using freeradius.



Problem description

A validation issue exists with the EAP-MSCHAPv2 module in FreeRADIUS.
Insufficient input validation was being done in the EAP-MSCHAPv2 state machine. A malicious attacker could manipulate their EAP-MSCHAPv2 client state machine to potentially convince the server to bypass authentication checks. This bypassing could also result in the server crashing.
This is tracked by the Mitre CVE ID CVE-2006-1354.


Please install the updates provided at the location noted below.

Installation notes

This update is provided as an RPM package that can easily be installed onto a running system by using this command:
rpm -Fvh freeradius.rpm

links to download packages

Download Source Packages

Download the source code of the patches for maintained products.


The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.

Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.

© Micro Focus