Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2006:0271 - Security Advisory
Issued:
2006-04-04
Updated:
2006-04-13

RHSA-2006:0271 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

freeradius security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated freeradius packages that fix an authentication weakness are now
available.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

FreeRADIUS is a high-performance and highly configurable free RADIUS server
designed to allow centralized authentication and authorization for a network.

A bug was found in the way FreeRADIUS authenticates users via the MSCHAP V2
protocol. It is possible for a remote attacker to authenticate as a victim
by sending a malformed MSCHAP V2 login request to the FreeRADIUS server.
(CVE-2006-1354)

Please note that FreeRADIUS installations not using the MSCHAP V2 protocol
for authentication are not vulnerable to this issue.

A bug was also found in the way FreeRADIUS logs SQL errors from the
sql_unixodbc module. It may be possible for an attacker to cause FreeRADIUS
to crash or execute arbitrary code if they are able to manipulate the SQL
database FreeRADIUS is connecting to. (CVE-2005-4744)

Users of FreeRADIUS should update to these erratum packages, which contain
backported patches and are not vulnerable to these issues.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Server 3 x86_64
  • Red Hat Enterprise Linux Server 3 ia64
  • Red Hat Enterprise Linux Server 3 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems 3 s390x
  • Red Hat Enterprise Linux for IBM z Systems 3 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian 3 ppc

Fixes

  • BZ - 167676 - CVE-2005-4744 Multiple freeradius security issues
  • BZ - 186083 - CVE-2006-1354 FreeRADIUS authentication bypass

CVEs

  • CVE-2006-1354
  • CVE-2005-4744

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
freeradius-1.0.1-3.RHEL4.3.src.rpm SHA-256: 2828833dd8ce414677a7f9ad72357cbca8b0964cc23fb94555be1680d53a6f2c
x86_64
freeradius-1.0.1-3.RHEL4.3.x86_64.rpm SHA-256: c922295d3819f6b36ef7d19f940703f0ae51e735db271c8380a59bb660967d62
freeradius-1.0.1-3.RHEL4.3.x86_64.rpm SHA-256: c922295d3819f6b36ef7d19f940703f0ae51e735db271c8380a59bb660967d62
freeradius-mysql-1.0.1-3.RHEL4.3.x86_64.rpm SHA-256: e4f50d4277bc1fc72e006d4ad3e9b3d00197e6e29ffca4129a65bec59d8597c6
freeradius-mysql-1.0.1-3.RHEL4.3.x86_64.rpm SHA-256: e4f50d4277bc1fc72e006d4ad3e9b3d00197e6e29ffca4129a65bec59d8597c6
freeradius-postgresql-1.0.1-3.RHEL4.3.x86_64.rpm SHA-256: 9fd979be9f3bcc82150ca6be32b1febe98808d4099f58ebdc7c3eb2dbaa70883
freeradius-postgresql-1.0.1-3.RHEL4.3.x86_64.rpm SHA-256: 9fd979be9f3bcc82150ca6be32b1febe98808d4099f58ebdc7c3eb2dbaa70883
freeradius-unixODBC-1.0.1-3.RHEL4.3.x86_64.rpm SHA-256: 56b9c5cf9848bf31e0ed3f7ba38c44c3de1d4e48e8c993701bf712bfdff022e6
freeradius-unixODBC-1.0.1-3.RHEL4.3.x86_64.rpm SHA-256: 56b9c5cf9848bf31e0ed3f7ba38c44c3de1d4e48e8c993701bf712bfdff022e6
ia64
freeradius-1.0.1-3.RHEL4.3.ia64.rpm SHA-256: fb57c128668e4d9dbeda37a9dcc5b10987a39a34754fb9664146ccb8e5edaf34
freeradius-1.0.1-3.RHEL4.3.ia64.rpm SHA-256: fb57c128668e4d9dbeda37a9dcc5b10987a39a34754fb9664146ccb8e5edaf34
freeradius-mysql-1.0.1-3.RHEL4.3.ia64.rpm SHA-256: 1daaf40f5909a92b292d3e2db4ce2a7fd680744fbe43ca99f65438e7232fe9a1
freeradius-mysql-1.0.1-3.RHEL4.3.ia64.rpm SHA-256: 1daaf40f5909a92b292d3e2db4ce2a7fd680744fbe43ca99f65438e7232fe9a1
freeradius-postgresql-1.0.1-3.RHEL4.3.ia64.rpm SHA-256: 505ec694c842f2380e22fbf3c09cf358796db438c573b1c645e5933107093c2a
freeradius-postgresql-1.0.1-3.RHEL4.3.ia64.rpm SHA-256: 505ec694c842f2380e22fbf3c09cf358796db438c573b1c645e5933107093c2a
freeradius-unixODBC-1.0.1-3.RHEL4.3.ia64.rpm SHA-256: 5cc442815a4dab74cb7597b7749e14770b4f9990e144d1ee8c73ed85c97df372
freeradius-unixODBC-1.0.1-3.RHEL4.3.ia64.rpm SHA-256: 5cc442815a4dab74cb7597b7749e14770b4f9990e144d1ee8c73ed85c97df372
i386
freeradius-1.0.1-3.RHEL4.3.i386.rpm SHA-256: 3b051ee9b137d406373773b2d2b774147346d334a3bd1f19659303c674610ee9
freeradius-1.0.1-3.RHEL4.3.i386.rpm SHA-256: 3b051ee9b137d406373773b2d2b774147346d334a3bd1f19659303c674610ee9
freeradius-mysql-1.0.1-3.RHEL4.3.i386.rpm SHA-256: 1342cb02c959cb7b2ab0049d1691fd33dc4e4c92698e5d7a1e85facbd3de21a4
freeradius-mysql-1.0.1-3.RHEL4.3.i386.rpm SHA-256: 1342cb02c959cb7b2ab0049d1691fd33dc4e4c92698e5d7a1e85facbd3de21a4
freeradius-postgresql-1.0.1-3.RHEL4.3.i386.rpm SHA-256: d48f7a956c9e8a1661b87fab1a0b858bdf8ad4056d48372cf97179827df358d3
freeradius-postgresql-1.0.1-3.RHEL4.3.i386.rpm SHA-256: d48f7a956c9e8a1661b87fab1a0b858bdf8ad4056d48372cf97179827df358d3
freeradius-unixODBC-1.0.1-3.RHEL4.3.i386.rpm SHA-256: dbe0ef5fc526b6849844a7a084309bb8ad42fedb6340efdda3a4ca68b32c7b2b
freeradius-unixODBC-1.0.1-3.RHEL4.3.i386.rpm SHA-256: dbe0ef5fc526b6849844a7a084309bb8ad42fedb6340efdda3a4ca68b32c7b2b

Red Hat Enterprise Linux Server 3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
freeradius-1.0.1-3.RHEL4.3.src.rpm SHA-256: 2828833dd8ce414677a7f9ad72357cbca8b0964cc23fb94555be1680d53a6f2c
s390x
freeradius-1.0.1-3.RHEL4.3.s390x.rpm SHA-256: 208fa8fae0c8a91631be07300aad7919334e45a8797a45df1ac87a500ad8a9cc
freeradius-mysql-1.0.1-3.RHEL4.3.s390x.rpm SHA-256: af55c11bf06ca009f424500f717bbe8484698deddb9fa396a02a060c09207f91
freeradius-postgresql-1.0.1-3.RHEL4.3.s390x.rpm SHA-256: a876dd0fef6a4abf214323079b3da0bf7024e51a144a45ca012c9676ab4e4628
freeradius-unixODBC-1.0.1-3.RHEL4.3.s390x.rpm SHA-256: 93f82ee48b2d9f77bc93e8ea70c1c9a3cdd2b32ff85c920b77cd25af9f190367
s390
freeradius-1.0.1-3.RHEL4.3.s390.rpm SHA-256: 9b3f51d8a2d8b140f64823d5c2ccc0e7a2864709fe586f6a55a71298133ed57f
freeradius-mysql-1.0.1-3.RHEL4.3.s390.rpm SHA-256: e6110b180ce78edae8d0c3e200ea9fdc44c4452ffa993cce4950dfcc1fdae31f
freeradius-postgresql-1.0.1-3.RHEL4.3.s390.rpm SHA-256: 08c5e82775c414758b054ca65377bfbf9a3ab2fd975d3b9e819e21da9e69d05d
freeradius-unixODBC-1.0.1-3.RHEL4.3.s390.rpm SHA-256: 79eba2848aa046cb417eb9975f4c19db2c0a98cdaaed74fcf87153ffe97de024

Red Hat Enterprise Linux for IBM z Systems 3

SRPM
s390x
s390

Red Hat Enterprise Linux for Power, big endian 4

SRPM
freeradius-1.0.1-3.RHEL4.3.src.rpm SHA-256: 2828833dd8ce414677a7f9ad72357cbca8b0964cc23fb94555be1680d53a6f2c
ppc
freeradius-1.0.1-3.RHEL4.3.ppc.rpm SHA-256: 8bc5a134ac8ca7c31398d64c21312a82e007d5def4c1526af95aeeeb3498d654
freeradius-mysql-1.0.1-3.RHEL4.3.ppc.rpm SHA-256: a2170771b2bf922325aa8f0fcba4a3f7a54ca70fd0e4bbca56819cf32a18fafc
freeradius-postgresql-1.0.1-3.RHEL4.3.ppc.rpm SHA-256: f62acab2d9a63a323fa0bd2024c363e6ef2580e133ef973a5b7480f4d7e17cc5
freeradius-unixODBC-1.0.1-3.RHEL4.3.ppc.rpm SHA-256: 462cf10140eaa541e59abb8a5344a3622cac30994fe8891cea24e56be21e3f39

Red Hat Enterprise Linux for Power, big endian 3

SRPM
ppc

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility