Tuesday, October 5, 2010

freeradius: syntactically invalid cron files vulnerability

Users of freeradius please be advised of a syntactically invalid cron files vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
MDVA-2010:203: [MDVA-2010:203] freeradius
Problem Description:



The cron files included in freeradius-web package were syntactically

invalid, by lacking mention of the user expected to run the task.
Read more at www.criticalwatch.com
 

No comments:

Post a Comment