Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2005-4744 (GCVE-0-2005-4744)
Vulnerability from cvelistv5 – Published: 2006-03-28 11:00 – Updated: 2024-08-07 23:53
VLAI?
EPSS
Summary
Off-by-one error in the sql_error function in sql_unixodbc.c in FreeRADIUS 1.0.2.5-5, and possibly other versions including 1.0.4, might allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing the external database query to fail. NOTE: this single issue is part of a larger-scale disclosure, originally by SUSE, which reported multiple issues that were disputed by FreeRADIUS. Disputed issues included file descriptor leaks, memory disclosure, LDAP injection, and other issues. Without additional information, the most recent FreeRADIUS report is being regarded as the authoritative source for this CVE identifier.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T23:53:29.082Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20060404-01-U",
"tags": [
"vendor-advisory",
"x_refsource_SGI",
"x_transferred"
],
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc"
},
{
"name": "14775",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/14775"
},
{
"name": "20461",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/20461"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.freeradius.org/security/20050909-response-to-suse.txt"
},
{
"name": "19811",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/19811"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.freeradius.org/security/20050909-vendor-sec.txt"
},
{
"name": "MDKSA-2006:066",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:066"
},
{
"name": "oval:org.mitre.oval:def:10449",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10449"
},
{
"name": "DSA-1089",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2006/dsa-1089"
},
{
"name": "19497",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/19497"
},
{
"name": "16712",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/16712"
},
{
"name": "RHSA-2006:0271",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2006-0271.html"
},
{
"name": "freeradius-token-sqlunixodbc-dos(22211)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22211"
},
{
"name": "19518",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/19518"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=167676"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-09-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Off-by-one error in the sql_error function in sql_unixodbc.c in FreeRADIUS 1.0.2.5-5, and possibly other versions including 1.0.4, might allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing the external database query to fail. NOTE: this single issue is part of a larger-scale disclosure, originally by SUSE, which reported multiple issues that were disputed by FreeRADIUS. Disputed issues included file descriptor leaks, memory disclosure, LDAP injection, and other issues. Without additional information, the most recent FreeRADIUS report is being regarded as the authoritative source for this CVE identifier."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-10-10T00:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "20060404-01-U",
"tags": [
"vendor-advisory",
"x_refsource_SGI"
],
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc"
},
{
"name": "14775",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/14775"
},
{
"name": "20461",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/20461"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.freeradius.org/security/20050909-response-to-suse.txt"
},
{
"name": "19811",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/19811"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.freeradius.org/security/20050909-vendor-sec.txt"
},
{
"name": "MDKSA-2006:066",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:066"
},
{
"name": "oval:org.mitre.oval:def:10449",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10449"
},
{
"name": "DSA-1089",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2006/dsa-1089"
},
{
"name": "19497",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/19497"
},
{
"name": "16712",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/16712"
},
{
"name": "RHSA-2006:0271",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2006-0271.html"
},
{
"name": "freeradius-token-sqlunixodbc-dos(22211)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22211"
},
{
"name": "19518",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/19518"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=167676"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2005-4744",
"datePublished": "2006-03-28T11:00:00",
"dateReserved": "2006-03-28T00:00:00",
"dateUpdated": "2024-08-07T23:53:29.082Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freeradius:freeradius:1.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F03F8FE-80BA-41A3-85CE-FFB6A18E6DCE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freeradius:freeradius:1.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C48FE12-68CB-462D-B75E-204894325F5D\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Off-by-one error in the sql_error function in sql_unixodbc.c in FreeRADIUS 1.0.2.5-5, and possibly other versions including 1.0.4, might allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing the external database query to fail. NOTE: this single issue is part of a larger-scale disclosure, originally by SUSE, which reported multiple issues that were disputed by FreeRADIUS. Disputed issues included file descriptor leaks, memory disclosure, LDAP injection, and other issues. Without additional information, the most recent FreeRADIUS report is being regarded as the authoritative source for this CVE identifier.\"}]",
"evaluatorComment": "The vendor has released version 1.0.5 of FreeRADIUS to address these issues.",
"id": "CVE-2005-4744",
"lastModified": "2024-11-21T00:05:04.687",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:P\", \"baseScore\": 6.4, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2005-12-31T05:00:00.000",
"references": "[{\"url\": \"ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2006-0271.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/16712\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/19497\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/19518\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/19811\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/20461\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.debian.org/security/2006/dsa-1089\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.freeradius.org/security/20050909-response-to-suse.txt\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.freeradius.org/security/20050909-vendor-sec.txt\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/14775\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:066\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=167676\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/22211\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10449\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2006-0271.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/16712\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/19497\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/19518\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/19811\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/20461\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2006/dsa-1089\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.freeradius.org/security/20050909-response-to-suse.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.freeradius.org/security/20050909-vendor-sec.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/14775\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:066\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=167676\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/22211\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10449\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2005-4744\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2005-12-31T05:00:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Off-by-one error in the sql_error function in sql_unixodbc.c in FreeRADIUS 1.0.2.5-5, and possibly other versions including 1.0.4, might allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing the external database query to fail. NOTE: this single issue is part of a larger-scale disclosure, originally by SUSE, which reported multiple issues that were disputed by FreeRADIUS. Disputed issues included file descriptor leaks, memory disclosure, LDAP injection, and other issues. Without additional information, the most recent FreeRADIUS report is being regarded as the authoritative source for this CVE identifier.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:P\",\"baseScore\":6.4,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freeradius:freeradius:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F03F8FE-80BA-41A3-85CE-FFB6A18E6DCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freeradius:freeradius:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C48FE12-68CB-462D-B75E-204894325F5D\"}]}]}],\"references\":[{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2006-0271.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/16712\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19497\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/19518\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/19811\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/20461\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1089\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.freeradius.org/security/20050909-response-to-suse.txt\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.freeradius.org/security/20050909-vendor-sec.txt\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/14775\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:066\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=167676\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/22211\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10449\",\"source\":\"secalert@redhat.com\"},{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2006-0271.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/16712\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19497\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/19518\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/19811\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/20461\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1089\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.freeradius.org/security/20050909-response-to-suse.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.freeradius.org/security/20050909-vendor-sec.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/14775\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:066\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=167676\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/22211\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10449\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorComment\":\"The vendor has released version 1.0.5 of FreeRADIUS to address these issues.\"}}"
}
}
GHSA-5382-QX5C-8J6G
Vulnerability from github – Published: 2022-05-03 03:14 – Updated: 2022-05-03 03:14
VLAI?
Details
Off-by-one error in the sql_error function in sql_unixodbc.c in FreeRADIUS 1.0.2.5-5, and possibly other versions including 1.0.4, might allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing the external database query to fail. NOTE: this single issue is part of a larger-scale disclosure, originally by SUSE, which reported multiple issues that were disputed by FreeRADIUS. Disputed issues included file descriptor leaks, memory disclosure, LDAP injection, and other issues. Without additional information, the most recent FreeRADIUS report is being regarded as the authoritative source for this CVE identifier.
{
"affected": [],
"aliases": [
"CVE-2005-4744"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2005-12-31T05:00:00Z",
"severity": "MODERATE"
},
"details": "Off-by-one error in the sql_error function in sql_unixodbc.c in FreeRADIUS 1.0.2.5-5, and possibly other versions including 1.0.4, might allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing the external database query to fail. NOTE: this single issue is part of a larger-scale disclosure, originally by SUSE, which reported multiple issues that were disputed by FreeRADIUS. Disputed issues included file descriptor leaks, memory disclosure, LDAP injection, and other issues. Without additional information, the most recent FreeRADIUS report is being regarded as the authoritative source for this CVE identifier.",
"id": "GHSA-5382-qx5c-8j6g",
"modified": "2022-05-03T03:14:39Z",
"published": "2022-05-03T03:14:39Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4744"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=167676"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22211"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10449"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2006-0271.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/16712"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/19497"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/19518"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/19811"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/20461"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2006/dsa-1089"
},
{
"type": "WEB",
"url": "http://www.freeradius.org/security/20050909-response-to-suse.txt"
},
{
"type": "WEB",
"url": "http://www.freeradius.org/security/20050909-vendor-sec.txt"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/14775"
},
{
"type": "WEB",
"url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:066"
}
],
"schema_version": "1.4.0",
"severity": []
}
RHSA-2006_0271
Vulnerability from csaf_redhat - Published: 2006-04-04 08:51 - Updated: 2024-11-22 00:11Summary
Red Hat Security Advisory: freeradius security update
Notes
Topic
Updated freeradius packages that fix an authentication weakness are now
available.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
FreeRADIUS is a high-performance and highly configurable free RADIUS server
designed to allow centralized authentication and authorization for a network.
A bug was found in the way FreeRADIUS authenticates users via the MSCHAP V2
protocol. It is possible for a remote attacker to authenticate as a victim
by sending a malformed MSCHAP V2 login request to the FreeRADIUS server.
(CVE-2006-1354)
Please note that FreeRADIUS installations not using the MSCHAP V2 protocol
for authentication are not vulnerable to this issue.
A bug was also found in the way FreeRADIUS logs SQL errors from the
sql_unixodbc module. It may be possible for an attacker to cause FreeRADIUS
to crash or execute arbitrary code if they are able to manipulate the SQL
database FreeRADIUS is connecting to. (CVE-2005-4744)
Users of FreeRADIUS should update to these erratum packages, which contain
backported patches and are not vulnerable to these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated freeradius packages that fix an authentication weakness are now\navailable.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "FreeRADIUS is a high-performance and highly configurable free RADIUS server\ndesigned to allow centralized authentication and authorization for a network. \n\nA bug was found in the way FreeRADIUS authenticates users via the MSCHAP V2\nprotocol. It is possible for a remote attacker to authenticate as a victim\nby sending a malformed MSCHAP V2 login request to the FreeRADIUS server.\n(CVE-2006-1354)\n\nPlease note that FreeRADIUS installations not using the MSCHAP V2 protocol\nfor authentication are not vulnerable to this issue.\n\nA bug was also found in the way FreeRADIUS logs SQL errors from the\nsql_unixodbc module. It may be possible for an attacker to cause FreeRADIUS\nto crash or execute arbitrary code if they are able to manipulate the SQL\ndatabase FreeRADIUS is connecting to. (CVE-2005-4744)\n\nUsers of FreeRADIUS should update to these erratum packages, which contain\nbackported patches and are not vulnerable to these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2006:0271",
"url": "https://access.redhat.com/errata/RHSA-2006:0271"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "167676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=167676"
},
{
"category": "external",
"summary": "186083",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=186083"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0271.json"
}
],
"title": "Red Hat Security Advisory: freeradius security update",
"tracking": {
"current_release_date": "2024-11-22T00:11:16+00:00",
"generator": {
"date": "2024-11-22T00:11:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2006:0271",
"initial_release_date": "2006-04-04T08:51:00+00:00",
"revision_history": [
{
"date": "2006-04-04T08:51:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2006-04-04T00:00:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T00:11:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3",
"product": {
"name": "Red Hat Enterprise Linux AS version 3",
"product_id": "3AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3",
"product": {
"name": "Red Hat Enterprise Linux ES version 3",
"product_id": "3ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:1.0.1-2.RHEL3.2.ia64",
"product": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.ia64",
"product_id": "freeradius-0:1.0.1-2.RHEL3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-2.RHEL3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64",
"product": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64",
"product_id": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@1.0.1-2.RHEL3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64",
"product": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64",
"product_id": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@1.0.1-3.RHEL4.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64",
"product": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64",
"product_id": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@1.0.1-3.RHEL4.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "freeradius-0:1.0.1-3.RHEL4.3.ia64",
"product": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.ia64",
"product_id": "freeradius-0:1.0.1-3.RHEL4.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-3.RHEL4.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64",
"product": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64",
"product_id": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@1.0.1-3.RHEL4.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64",
"product": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64",
"product_id": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@1.0.1-3.RHEL4.3?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:1.0.1-2.RHEL3.2.src",
"product": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.src",
"product_id": "freeradius-0:1.0.1-2.RHEL3.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-2.RHEL3.2?arch=src"
}
}
},
{
"category": "product_version",
"name": "freeradius-0:1.0.1-3.RHEL4.3.src",
"product": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.src",
"product_id": "freeradius-0:1.0.1-3.RHEL4.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-3.RHEL4.3?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:1.0.1-2.RHEL3.2.x86_64",
"product": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.x86_64",
"product_id": "freeradius-0:1.0.1-2.RHEL3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-2.RHEL3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64",
"product": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64",
"product_id": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@1.0.1-2.RHEL3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64",
"product": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64",
"product_id": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@1.0.1-3.RHEL4.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64",
"product": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64",
"product_id": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@1.0.1-3.RHEL4.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-0:1.0.1-3.RHEL4.3.x86_64",
"product": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.x86_64",
"product_id": "freeradius-0:1.0.1-3.RHEL4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-3.RHEL4.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64",
"product": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64",
"product_id": "freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@1.0.1-3.RHEL4.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64",
"product": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64",
"product_id": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@1.0.1-3.RHEL4.3?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:1.0.1-2.RHEL3.2.i386",
"product": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.i386",
"product_id": "freeradius-0:1.0.1-2.RHEL3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-2.RHEL3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386",
"product": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386",
"product_id": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@1.0.1-2.RHEL3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386",
"product": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386",
"product_id": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@1.0.1-3.RHEL4.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386",
"product": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386",
"product_id": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@1.0.1-3.RHEL4.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "freeradius-0:1.0.1-3.RHEL4.3.i386",
"product": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.i386",
"product_id": "freeradius-0:1.0.1-3.RHEL4.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-3.RHEL4.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.i386",
"product": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.i386",
"product_id": "freeradius-mysql-0:1.0.1-3.RHEL4.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@1.0.1-3.RHEL4.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386",
"product": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386",
"product_id": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@1.0.1-3.RHEL4.3?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:1.0.1-2.RHEL3.2.ppc",
"product": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.ppc",
"product_id": "freeradius-0:1.0.1-2.RHEL3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-2.RHEL3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc",
"product": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc",
"product_id": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@1.0.1-2.RHEL3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc",
"product": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc",
"product_id": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@1.0.1-3.RHEL4.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc",
"product": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc",
"product_id": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@1.0.1-3.RHEL4.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "freeradius-0:1.0.1-3.RHEL4.3.ppc",
"product": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.ppc",
"product_id": "freeradius-0:1.0.1-3.RHEL4.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-3.RHEL4.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc",
"product": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc",
"product_id": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@1.0.1-3.RHEL4.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc",
"product": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc",
"product_id": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@1.0.1-3.RHEL4.3?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:1.0.1-2.RHEL3.2.s390x",
"product": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.s390x",
"product_id": "freeradius-0:1.0.1-2.RHEL3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-2.RHEL3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x",
"product": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x",
"product_id": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@1.0.1-2.RHEL3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x",
"product": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x",
"product_id": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@1.0.1-3.RHEL4.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x",
"product": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x",
"product_id": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@1.0.1-3.RHEL4.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-0:1.0.1-3.RHEL4.3.s390x",
"product": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.s390x",
"product_id": "freeradius-0:1.0.1-3.RHEL4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-3.RHEL4.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x",
"product": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x",
"product_id": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@1.0.1-3.RHEL4.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x",
"product": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x",
"product_id": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@1.0.1-3.RHEL4.3?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:1.0.1-2.RHEL3.2.s390",
"product": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.s390",
"product_id": "freeradius-0:1.0.1-2.RHEL3.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-2.RHEL3.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390",
"product": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390",
"product_id": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@1.0.1-2.RHEL3.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390",
"product": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390",
"product_id": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@1.0.1-3.RHEL4.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390",
"product": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390",
"product_id": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@1.0.1-3.RHEL4.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "freeradius-0:1.0.1-3.RHEL4.3.s390",
"product": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.s390",
"product_id": "freeradius-0:1.0.1-3.RHEL4.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-3.RHEL4.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390",
"product": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390",
"product_id": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@1.0.1-3.RHEL4.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390",
"product": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390",
"product_id": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@1.0.1-3.RHEL4.3?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:freeradius-0:1.0.1-2.RHEL3.2.i386"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:freeradius-0:1.0.1-2.RHEL3.2.ia64"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:freeradius-0:1.0.1-2.RHEL3.2.ppc"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:freeradius-0:1.0.1-2.RHEL3.2.s390"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:freeradius-0:1.0.1-2.RHEL3.2.s390x"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.src as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:freeradius-0:1.0.1-2.RHEL3.2.src"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.src",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:freeradius-0:1.0.1-2.RHEL3.2.x86_64"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:freeradius-0:1.0.1-2.RHEL3.2.i386"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:freeradius-0:1.0.1-2.RHEL3.2.ia64"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:freeradius-0:1.0.1-2.RHEL3.2.ppc"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:freeradius-0:1.0.1-2.RHEL3.2.s390"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:freeradius-0:1.0.1-2.RHEL3.2.s390x"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.src as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:freeradius-0:1.0.1-2.RHEL3.2.src"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.src",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:freeradius-0:1.0.1-2.RHEL3.2.x86_64"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-0:1.0.1-3.RHEL4.3.i386"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-0:1.0.1-3.RHEL4.3.ia64"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-0:1.0.1-3.RHEL4.3.ppc"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-0:1.0.1-3.RHEL4.3.s390"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-0:1.0.1-3.RHEL4.3.s390x"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-0:1.0.1-3.RHEL4.3.src"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-0:1.0.1-3.RHEL4.3.x86_64"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.i386"
},
"product_reference": "freeradius-mysql-0:1.0.1-3.RHEL4.3.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64"
},
"product_reference": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc"
},
"product_reference": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390"
},
"product_reference": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x"
},
"product_reference": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64"
},
"product_reference": "freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386"
},
"product_reference": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64"
},
"product_reference": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc"
},
"product_reference": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390"
},
"product_reference": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x"
},
"product_reference": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64"
},
"product_reference": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386"
},
"product_reference": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64"
},
"product_reference": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc"
},
"product_reference": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390"
},
"product_reference": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x"
},
"product_reference": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64"
},
"product_reference": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-0:1.0.1-3.RHEL4.3.i386"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-0:1.0.1-3.RHEL4.3.ia64"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-0:1.0.1-3.RHEL4.3.ppc"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-0:1.0.1-3.RHEL4.3.s390"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-0:1.0.1-3.RHEL4.3.s390x"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-0:1.0.1-3.RHEL4.3.src"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-0:1.0.1-3.RHEL4.3.x86_64"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.i386"
},
"product_reference": "freeradius-mysql-0:1.0.1-3.RHEL4.3.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64"
},
"product_reference": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc"
},
"product_reference": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390"
},
"product_reference": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x"
},
"product_reference": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64"
},
"product_reference": "freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386"
},
"product_reference": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64"
},
"product_reference": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc"
},
"product_reference": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390"
},
"product_reference": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x"
},
"product_reference": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64"
},
"product_reference": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386"
},
"product_reference": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64"
},
"product_reference": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc"
},
"product_reference": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390"
},
"product_reference": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x"
},
"product_reference": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64"
},
"product_reference": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64",
"relates_to_product_reference": "4ES"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2005-4744",
"discovery_date": "2005-05-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617862"
}
],
"notes": [
{
"category": "description",
"text": "Off-by-one error in the sql_error function in sql_unixodbc.c in FreeRADIUS 1.0.2.5-5, and possibly other versions including 1.0.4, might allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing the external database query to fail. NOTE: this single issue is part of a larger-scale disclosure, originally by SUSE, which reported multiple issues that were disputed by FreeRADIUS. Disputed issues included file descriptor leaks, memory disclosure, LDAP injection, and other issues. Without additional information, the most recent FreeRADIUS report is being regarded as the authoritative source for this CVE identifier.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:freeradius-0:1.0.1-2.RHEL3.2.i386",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.ia64",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.ppc",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.s390",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.s390x",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.src",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.x86_64",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.i386",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.ia64",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.ppc",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.s390",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.s390x",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.src",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.x86_64",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.src",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.src",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-4744"
},
{
"category": "external",
"summary": "RHBZ#1617862",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617862"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-4744",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-4744"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-4744",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4744"
}
],
"release_date": "2005-09-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-04-04T08:51:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:freeradius-0:1.0.1-2.RHEL3.2.i386",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.ia64",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.ppc",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.s390",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.s390x",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.src",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.x86_64",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.i386",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.ia64",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.ppc",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.s390",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.s390x",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.src",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.x86_64",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.src",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.src",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0271"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-1354",
"discovery_date": "2006-03-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618034"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in FreeRADIUS 1.0.0 up to 1.1.0 allows remote attackers to bypass authentication or cause a denial of service (server crash) via \"Insufficient input validation\" in the EAP-MSCHAPv2 state machine module.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:freeradius-0:1.0.1-2.RHEL3.2.i386",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.ia64",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.ppc",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.s390",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.s390x",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.src",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.x86_64",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.i386",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.ia64",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.ppc",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.s390",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.s390x",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.src",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.x86_64",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.src",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.src",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-1354"
},
{
"category": "external",
"summary": "RHBZ#1618034",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618034"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-1354"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1354",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1354"
}
],
"release_date": "2006-03-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-04-04T08:51:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:freeradius-0:1.0.1-2.RHEL3.2.i386",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.ia64",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.ppc",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.s390",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.s390x",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.src",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.x86_64",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.i386",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.ia64",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.ppc",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.s390",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.s390x",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.src",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.x86_64",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.src",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.src",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0271"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
}
]
}
RHSA-2006:0271
Vulnerability from csaf_redhat - Published: 2006-04-04 08:51 - Updated: 2025-11-21 17:30Summary
Red Hat Security Advisory: freeradius security update
Notes
Topic
Updated freeradius packages that fix an authentication weakness are now
available.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
FreeRADIUS is a high-performance and highly configurable free RADIUS server
designed to allow centralized authentication and authorization for a network.
A bug was found in the way FreeRADIUS authenticates users via the MSCHAP V2
protocol. It is possible for a remote attacker to authenticate as a victim
by sending a malformed MSCHAP V2 login request to the FreeRADIUS server.
(CVE-2006-1354)
Please note that FreeRADIUS installations not using the MSCHAP V2 protocol
for authentication are not vulnerable to this issue.
A bug was also found in the way FreeRADIUS logs SQL errors from the
sql_unixodbc module. It may be possible for an attacker to cause FreeRADIUS
to crash or execute arbitrary code if they are able to manipulate the SQL
database FreeRADIUS is connecting to. (CVE-2005-4744)
Users of FreeRADIUS should update to these erratum packages, which contain
backported patches and are not vulnerable to these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated freeradius packages that fix an authentication weakness are now\navailable.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "FreeRADIUS is a high-performance and highly configurable free RADIUS server\ndesigned to allow centralized authentication and authorization for a network. \n\nA bug was found in the way FreeRADIUS authenticates users via the MSCHAP V2\nprotocol. It is possible for a remote attacker to authenticate as a victim\nby sending a malformed MSCHAP V2 login request to the FreeRADIUS server.\n(CVE-2006-1354)\n\nPlease note that FreeRADIUS installations not using the MSCHAP V2 protocol\nfor authentication are not vulnerable to this issue.\n\nA bug was also found in the way FreeRADIUS logs SQL errors from the\nsql_unixodbc module. It may be possible for an attacker to cause FreeRADIUS\nto crash or execute arbitrary code if they are able to manipulate the SQL\ndatabase FreeRADIUS is connecting to. (CVE-2005-4744)\n\nUsers of FreeRADIUS should update to these erratum packages, which contain\nbackported patches and are not vulnerable to these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2006:0271",
"url": "https://access.redhat.com/errata/RHSA-2006:0271"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "167676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=167676"
},
{
"category": "external",
"summary": "186083",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=186083"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0271.json"
}
],
"title": "Red Hat Security Advisory: freeradius security update",
"tracking": {
"current_release_date": "2025-11-21T17:30:07+00:00",
"generator": {
"date": "2025-11-21T17:30:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2006:0271",
"initial_release_date": "2006-04-04T08:51:00+00:00",
"revision_history": [
{
"date": "2006-04-04T08:51:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2006-04-04T00:00:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:30:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3",
"product": {
"name": "Red Hat Enterprise Linux AS version 3",
"product_id": "3AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3",
"product": {
"name": "Red Hat Enterprise Linux ES version 3",
"product_id": "3ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:1.0.1-2.RHEL3.2.ia64",
"product": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.ia64",
"product_id": "freeradius-0:1.0.1-2.RHEL3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-2.RHEL3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64",
"product": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64",
"product_id": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@1.0.1-2.RHEL3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64",
"product": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64",
"product_id": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@1.0.1-3.RHEL4.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64",
"product": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64",
"product_id": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@1.0.1-3.RHEL4.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "freeradius-0:1.0.1-3.RHEL4.3.ia64",
"product": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.ia64",
"product_id": "freeradius-0:1.0.1-3.RHEL4.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-3.RHEL4.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64",
"product": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64",
"product_id": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@1.0.1-3.RHEL4.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64",
"product": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64",
"product_id": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@1.0.1-3.RHEL4.3?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:1.0.1-2.RHEL3.2.src",
"product": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.src",
"product_id": "freeradius-0:1.0.1-2.RHEL3.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-2.RHEL3.2?arch=src"
}
}
},
{
"category": "product_version",
"name": "freeradius-0:1.0.1-3.RHEL4.3.src",
"product": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.src",
"product_id": "freeradius-0:1.0.1-3.RHEL4.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-3.RHEL4.3?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:1.0.1-2.RHEL3.2.x86_64",
"product": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.x86_64",
"product_id": "freeradius-0:1.0.1-2.RHEL3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-2.RHEL3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64",
"product": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64",
"product_id": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@1.0.1-2.RHEL3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64",
"product": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64",
"product_id": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@1.0.1-3.RHEL4.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64",
"product": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64",
"product_id": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@1.0.1-3.RHEL4.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-0:1.0.1-3.RHEL4.3.x86_64",
"product": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.x86_64",
"product_id": "freeradius-0:1.0.1-3.RHEL4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-3.RHEL4.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64",
"product": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64",
"product_id": "freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@1.0.1-3.RHEL4.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64",
"product": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64",
"product_id": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@1.0.1-3.RHEL4.3?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:1.0.1-2.RHEL3.2.i386",
"product": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.i386",
"product_id": "freeradius-0:1.0.1-2.RHEL3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-2.RHEL3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386",
"product": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386",
"product_id": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@1.0.1-2.RHEL3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386",
"product": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386",
"product_id": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@1.0.1-3.RHEL4.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386",
"product": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386",
"product_id": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@1.0.1-3.RHEL4.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "freeradius-0:1.0.1-3.RHEL4.3.i386",
"product": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.i386",
"product_id": "freeradius-0:1.0.1-3.RHEL4.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-3.RHEL4.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.i386",
"product": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.i386",
"product_id": "freeradius-mysql-0:1.0.1-3.RHEL4.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@1.0.1-3.RHEL4.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386",
"product": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386",
"product_id": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@1.0.1-3.RHEL4.3?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:1.0.1-2.RHEL3.2.ppc",
"product": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.ppc",
"product_id": "freeradius-0:1.0.1-2.RHEL3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-2.RHEL3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc",
"product": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc",
"product_id": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@1.0.1-2.RHEL3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc",
"product": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc",
"product_id": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@1.0.1-3.RHEL4.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc",
"product": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc",
"product_id": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@1.0.1-3.RHEL4.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "freeradius-0:1.0.1-3.RHEL4.3.ppc",
"product": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.ppc",
"product_id": "freeradius-0:1.0.1-3.RHEL4.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-3.RHEL4.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc",
"product": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc",
"product_id": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@1.0.1-3.RHEL4.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc",
"product": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc",
"product_id": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@1.0.1-3.RHEL4.3?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:1.0.1-2.RHEL3.2.s390x",
"product": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.s390x",
"product_id": "freeradius-0:1.0.1-2.RHEL3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-2.RHEL3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x",
"product": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x",
"product_id": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@1.0.1-2.RHEL3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x",
"product": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x",
"product_id": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@1.0.1-3.RHEL4.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x",
"product": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x",
"product_id": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@1.0.1-3.RHEL4.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-0:1.0.1-3.RHEL4.3.s390x",
"product": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.s390x",
"product_id": "freeradius-0:1.0.1-3.RHEL4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-3.RHEL4.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x",
"product": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x",
"product_id": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@1.0.1-3.RHEL4.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x",
"product": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x",
"product_id": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@1.0.1-3.RHEL4.3?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:1.0.1-2.RHEL3.2.s390",
"product": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.s390",
"product_id": "freeradius-0:1.0.1-2.RHEL3.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-2.RHEL3.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390",
"product": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390",
"product_id": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@1.0.1-2.RHEL3.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390",
"product": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390",
"product_id": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@1.0.1-3.RHEL4.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390",
"product": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390",
"product_id": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@1.0.1-3.RHEL4.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "freeradius-0:1.0.1-3.RHEL4.3.s390",
"product": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.s390",
"product_id": "freeradius-0:1.0.1-3.RHEL4.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@1.0.1-3.RHEL4.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390",
"product": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390",
"product_id": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@1.0.1-3.RHEL4.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390",
"product": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390",
"product_id": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@1.0.1-3.RHEL4.3?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:freeradius-0:1.0.1-2.RHEL3.2.i386"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:freeradius-0:1.0.1-2.RHEL3.2.ia64"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:freeradius-0:1.0.1-2.RHEL3.2.ppc"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:freeradius-0:1.0.1-2.RHEL3.2.s390"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:freeradius-0:1.0.1-2.RHEL3.2.s390x"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.src as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:freeradius-0:1.0.1-2.RHEL3.2.src"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.src",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:freeradius-0:1.0.1-2.RHEL3.2.x86_64"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:freeradius-0:1.0.1-2.RHEL3.2.i386"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:freeradius-0:1.0.1-2.RHEL3.2.ia64"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:freeradius-0:1.0.1-2.RHEL3.2.ppc"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:freeradius-0:1.0.1-2.RHEL3.2.s390"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:freeradius-0:1.0.1-2.RHEL3.2.s390x"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.src as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:freeradius-0:1.0.1-2.RHEL3.2.src"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.src",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-2.RHEL3.2.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:freeradius-0:1.0.1-2.RHEL3.2.x86_64"
},
"product_reference": "freeradius-0:1.0.1-2.RHEL3.2.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-0:1.0.1-3.RHEL4.3.i386"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-0:1.0.1-3.RHEL4.3.ia64"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-0:1.0.1-3.RHEL4.3.ppc"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-0:1.0.1-3.RHEL4.3.s390"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-0:1.0.1-3.RHEL4.3.s390x"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-0:1.0.1-3.RHEL4.3.src"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-0:1.0.1-3.RHEL4.3.x86_64"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.i386"
},
"product_reference": "freeradius-mysql-0:1.0.1-3.RHEL4.3.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64"
},
"product_reference": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc"
},
"product_reference": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390"
},
"product_reference": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x"
},
"product_reference": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64"
},
"product_reference": "freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386"
},
"product_reference": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64"
},
"product_reference": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc"
},
"product_reference": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390"
},
"product_reference": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x"
},
"product_reference": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64"
},
"product_reference": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386"
},
"product_reference": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64"
},
"product_reference": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc"
},
"product_reference": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390"
},
"product_reference": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x"
},
"product_reference": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64"
},
"product_reference": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-0:1.0.1-3.RHEL4.3.i386"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-0:1.0.1-3.RHEL4.3.ia64"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-0:1.0.1-3.RHEL4.3.ppc"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-0:1.0.1-3.RHEL4.3.s390"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-0:1.0.1-3.RHEL4.3.s390x"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-0:1.0.1-3.RHEL4.3.src"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:1.0.1-3.RHEL4.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-0:1.0.1-3.RHEL4.3.x86_64"
},
"product_reference": "freeradius-0:1.0.1-3.RHEL4.3.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64"
},
"product_reference": "freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.i386"
},
"product_reference": "freeradius-mysql-0:1.0.1-3.RHEL4.3.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64"
},
"product_reference": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc"
},
"product_reference": "freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390"
},
"product_reference": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x"
},
"product_reference": "freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64"
},
"product_reference": "freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386"
},
"product_reference": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64"
},
"product_reference": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc"
},
"product_reference": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390"
},
"product_reference": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x"
},
"product_reference": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64"
},
"product_reference": "freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386"
},
"product_reference": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64"
},
"product_reference": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc"
},
"product_reference": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390"
},
"product_reference": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x"
},
"product_reference": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64"
},
"product_reference": "freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64",
"relates_to_product_reference": "4ES"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2005-4744",
"discovery_date": "2005-05-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617862"
}
],
"notes": [
{
"category": "description",
"text": "Off-by-one error in the sql_error function in sql_unixodbc.c in FreeRADIUS 1.0.2.5-5, and possibly other versions including 1.0.4, might allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing the external database query to fail. NOTE: this single issue is part of a larger-scale disclosure, originally by SUSE, which reported multiple issues that were disputed by FreeRADIUS. Disputed issues included file descriptor leaks, memory disclosure, LDAP injection, and other issues. Without additional information, the most recent FreeRADIUS report is being regarded as the authoritative source for this CVE identifier.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:freeradius-0:1.0.1-2.RHEL3.2.i386",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.ia64",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.ppc",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.s390",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.s390x",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.src",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.x86_64",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.i386",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.ia64",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.ppc",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.s390",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.s390x",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.src",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.x86_64",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.src",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.src",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-4744"
},
{
"category": "external",
"summary": "RHBZ#1617862",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617862"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-4744",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-4744"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-4744",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4744"
}
],
"release_date": "2005-09-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-04-04T08:51:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:freeradius-0:1.0.1-2.RHEL3.2.i386",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.ia64",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.ppc",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.s390",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.s390x",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.src",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.x86_64",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.i386",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.ia64",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.ppc",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.s390",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.s390x",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.src",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.x86_64",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.src",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.src",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0271"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-1354",
"discovery_date": "2006-03-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618034"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in FreeRADIUS 1.0.0 up to 1.1.0 allows remote attackers to bypass authentication or cause a denial of service (server crash) via \"Insufficient input validation\" in the EAP-MSCHAPv2 state machine module.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:freeradius-0:1.0.1-2.RHEL3.2.i386",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.ia64",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.ppc",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.s390",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.s390x",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.src",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.x86_64",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.i386",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.ia64",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.ppc",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.s390",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.s390x",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.src",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.x86_64",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.src",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.src",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-1354"
},
{
"category": "external",
"summary": "RHBZ#1618034",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618034"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-1354"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1354",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1354"
}
],
"release_date": "2006-03-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-04-04T08:51:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:freeradius-0:1.0.1-2.RHEL3.2.i386",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.ia64",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.ppc",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.s390",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.s390x",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.src",
"3AS:freeradius-0:1.0.1-2.RHEL3.2.x86_64",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x",
"3AS:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.i386",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.ia64",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.ppc",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.s390",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.s390x",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.src",
"3ES:freeradius-0:1.0.1-2.RHEL3.2.x86_64",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.i386",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ia64",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.ppc",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.s390x",
"3ES:freeradius-debuginfo-0:1.0.1-2.RHEL3.2.x86_64",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.src",
"4AS:freeradius-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x",
"4AS:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.src",
"4ES:freeradius-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-debuginfo-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-mysql-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-postgresql-0:1.0.1-3.RHEL4.3.x86_64",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.i386",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ia64",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.ppc",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.s390x",
"4ES:freeradius-unixODBC-0:1.0.1-3.RHEL4.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0271"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
}
]
}
GSD-2005-4744
Vulnerability from gsd - Updated: 2023-12-13 01:20Details
Off-by-one error in the sql_error function in sql_unixodbc.c in FreeRADIUS 1.0.2.5-5, and possibly other versions including 1.0.4, might allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing the external database query to fail. NOTE: this single issue is part of a larger-scale disclosure, originally by SUSE, which reported multiple issues that were disputed by FreeRADIUS. Disputed issues included file descriptor leaks, memory disclosure, LDAP injection, and other issues. Without additional information, the most recent FreeRADIUS report is being regarded as the authoritative source for this CVE identifier.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2005-4744",
"description": "Off-by-one error in the sql_error function in sql_unixodbc.c in FreeRADIUS 1.0.2.5-5, and possibly other versions including 1.0.4, might allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing the external database query to fail. NOTE: this single issue is part of a larger-scale disclosure, originally by SUSE, which reported multiple issues that were disputed by FreeRADIUS. Disputed issues included file descriptor leaks, memory disclosure, LDAP injection, and other issues. Without additional information, the most recent FreeRADIUS report is being regarded as the authoritative source for this CVE identifier.",
"id": "GSD-2005-4744",
"references": [
"https://www.suse.com/security/cve/CVE-2005-4744.html",
"https://www.debian.org/security/2006/dsa-1089",
"https://access.redhat.com/errata/RHSA-2006:0271"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2005-4744"
],
"details": "Off-by-one error in the sql_error function in sql_unixodbc.c in FreeRADIUS 1.0.2.5-5, and possibly other versions including 1.0.4, might allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing the external database query to fail. NOTE: this single issue is part of a larger-scale disclosure, originally by SUSE, which reported multiple issues that were disputed by FreeRADIUS. Disputed issues included file descriptor leaks, memory disclosure, LDAP injection, and other issues. Without additional information, the most recent FreeRADIUS report is being regarded as the authoritative source for this CVE identifier.",
"id": "GSD-2005-4744",
"modified": "2023-12-13T01:20:09.869189Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2005-4744",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Off-by-one error in the sql_error function in sql_unixodbc.c in FreeRADIUS 1.0.2.5-5, and possibly other versions including 1.0.4, might allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing the external database query to fail. NOTE: this single issue is part of a larger-scale disclosure, originally by SUSE, which reported multiple issues that were disputed by FreeRADIUS. Disputed issues included file descriptor leaks, memory disclosure, LDAP injection, and other issues. Without additional information, the most recent FreeRADIUS report is being regarded as the authoritative source for this CVE identifier."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc",
"refsource": "MISC",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc"
},
{
"name": "http://secunia.com/advisories/19811",
"refsource": "MISC",
"url": "http://secunia.com/advisories/19811"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2006-0271.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2006-0271.html"
},
{
"name": "http://secunia.com/advisories/16712",
"refsource": "MISC",
"url": "http://secunia.com/advisories/16712"
},
{
"name": "http://secunia.com/advisories/19497",
"refsource": "MISC",
"url": "http://secunia.com/advisories/19497"
},
{
"name": "http://secunia.com/advisories/19518",
"refsource": "MISC",
"url": "http://secunia.com/advisories/19518"
},
{
"name": "http://secunia.com/advisories/20461",
"refsource": "MISC",
"url": "http://secunia.com/advisories/20461"
},
{
"name": "http://www.debian.org/security/2006/dsa-1089",
"refsource": "MISC",
"url": "http://www.debian.org/security/2006/dsa-1089"
},
{
"name": "http://www.freeradius.org/security/20050909-response-to-suse.txt",
"refsource": "MISC",
"url": "http://www.freeradius.org/security/20050909-response-to-suse.txt"
},
{
"name": "http://www.freeradius.org/security/20050909-vendor-sec.txt",
"refsource": "MISC",
"url": "http://www.freeradius.org/security/20050909-vendor-sec.txt"
},
{
"name": "http://www.securityfocus.com/bid/14775",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/14775"
},
{
"name": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:066",
"refsource": "MISC",
"url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:066"
},
{
"name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=167676",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=167676"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22211",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22211"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10449",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10449"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:freeradius:freeradius:1.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freeradius:freeradius:1.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2005-4744"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Off-by-one error in the sql_error function in sql_unixodbc.c in FreeRADIUS 1.0.2.5-5, and possibly other versions including 1.0.4, might allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing the external database query to fail. NOTE: this single issue is part of a larger-scale disclosure, originally by SUSE, which reported multiple issues that were disputed by FreeRADIUS. Disputed issues included file descriptor leaks, memory disclosure, LDAP injection, and other issues. Without additional information, the most recent FreeRADIUS report is being regarded as the authoritative source for this CVE identifier."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.freeradius.org/security/20050909-response-to-suse.txt",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.freeradius.org/security/20050909-response-to-suse.txt"
},
{
"name": "http://www.freeradius.org/security/20050909-vendor-sec.txt",
"refsource": "MISC",
"tags": [],
"url": "http://www.freeradius.org/security/20050909-vendor-sec.txt"
},
{
"name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=167676",
"refsource": "MISC",
"tags": [],
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=167676"
},
{
"name": "14775",
"refsource": "BID",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/14775"
},
{
"name": "16712",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/16712"
},
{
"name": "MDKSA-2006:066",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:066"
},
{
"name": "RHSA-2006:0271",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2006-0271.html"
},
{
"name": "19497",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/19497"
},
{
"name": "19518",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/19518"
},
{
"name": "20060404-01-U",
"refsource": "SGI",
"tags": [],
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc"
},
{
"name": "19811",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/19811"
},
{
"name": "DSA-1089",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2006/dsa-1089"
},
{
"name": "20461",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/20461"
},
{
"name": "freeradius-token-sqlunixodbc-dos(22211)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22211"
},
{
"name": "oval:org.mitre.oval:def:10449",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10449"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-02-13T02:15Z",
"publishedDate": "2005-12-31T05:00Z"
}
}
}
FKIE_CVE-2005-4744
Vulnerability from fkie_nvd - Published: 2005-12-31 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Off-by-one error in the sql_error function in sql_unixodbc.c in FreeRADIUS 1.0.2.5-5, and possibly other versions including 1.0.4, might allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing the external database query to fail. NOTE: this single issue is part of a larger-scale disclosure, originally by SUSE, which reported multiple issues that were disputed by FreeRADIUS. Disputed issues included file descriptor leaks, memory disclosure, LDAP injection, and other issues. Without additional information, the most recent FreeRADIUS report is being regarded as the authoritative source for this CVE identifier.
References
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc | ||
| secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2006-0271.html | ||
| secalert@redhat.com | http://secunia.com/advisories/16712 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/19497 | ||
| secalert@redhat.com | http://secunia.com/advisories/19518 | ||
| secalert@redhat.com | http://secunia.com/advisories/19811 | ||
| secalert@redhat.com | http://secunia.com/advisories/20461 | ||
| secalert@redhat.com | http://www.debian.org/security/2006/dsa-1089 | ||
| secalert@redhat.com | http://www.freeradius.org/security/20050909-response-to-suse.txt | ||
| secalert@redhat.com | http://www.freeradius.org/security/20050909-vendor-sec.txt | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/14775 | Patch | |
| secalert@redhat.com | http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:066 | ||
| secalert@redhat.com | https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=167676 | ||
| secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/22211 | ||
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10449 | ||
| af854a3a-2127-422b-91ae-364da2661108 | ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2006-0271.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/16712 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/19497 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/19518 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/19811 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/20461 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2006/dsa-1089 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.freeradius.org/security/20050909-response-to-suse.txt | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.freeradius.org/security/20050909-vendor-sec.txt | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/14775 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:066 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=167676 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/22211 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10449 |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| freeradius | freeradius | 1.0.3 | |
| freeradius | freeradius | 1.0.4 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:freeradius:freeradius:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3F03F8FE-80BA-41A3-85CE-FFB6A18E6DCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freeradius:freeradius:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4C48FE12-68CB-462D-B75E-204894325F5D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Off-by-one error in the sql_error function in sql_unixodbc.c in FreeRADIUS 1.0.2.5-5, and possibly other versions including 1.0.4, might allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing the external database query to fail. NOTE: this single issue is part of a larger-scale disclosure, originally by SUSE, which reported multiple issues that were disputed by FreeRADIUS. Disputed issues included file descriptor leaks, memory disclosure, LDAP injection, and other issues. Without additional information, the most recent FreeRADIUS report is being regarded as the authoritative source for this CVE identifier."
}
],
"evaluatorComment": "The vendor has released version 1.0.5 of FreeRADIUS to address these issues.",
"id": "CVE-2005-4744",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2005-12-31T05:00:00.000",
"references": [
{
"source": "secalert@redhat.com",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2006-0271.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/16712"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/19497"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/19518"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/19811"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/20461"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2006/dsa-1089"
},
{
"source": "secalert@redhat.com",
"url": "http://www.freeradius.org/security/20050909-response-to-suse.txt"
},
{
"source": "secalert@redhat.com",
"url": "http://www.freeradius.org/security/20050909-vendor-sec.txt"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/14775"
},
{
"source": "secalert@redhat.com",
"url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:066"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=167676"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22211"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10449"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2006-0271.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/16712"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/19497"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/19518"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/19811"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/20461"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2006/dsa-1089"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.freeradius.org/security/20050909-response-to-suse.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.freeradius.org/security/20050909-vendor-sec.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/14775"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:066"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=167676"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22211"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10449"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…