Package: freeradius
Version: 1.1.7-1
Severity: grave
Tags: security
Justification: user security hole

By default freeradius leaves /var/log/freeradius with permissions 755.
Enabling sqltrace will result in a world-readable sqltrace in this,
possibly containing cleartext passwords.

Been there, done that, lost two passwords.

Is there a reason for having /var/log/freeradius world-readable?

Syggestion:
Change /var/log/freeradius permissions to 750.

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (990, 'stable'), (500, 'unstable'), (500, 'testing')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-6-amd64
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages freeradius depends on:
ii  adduser                3.102             Add and remove users and groups
ii  libc6                  2.3.6.ds1-13etch5 GNU C Library: Shared libraries
ii  libgdbm3               1.8.3-3           GNU dbm database routines (runtime
ii  libltdl3               1.5.22-4          A system independent dlopen wrappe
ii  libpam0g               0.79-5            Pluggable Authentication Modules l
ii  libperl5.8             5.8.8-7etch3      Shared Perl library
ii  libsnmp9               5.2.3-7etch2      NET SNMP (Simple Network Managemen
ii  lsb-base               3.1-23.2etch1     Linux Standard Base 3.1 init scrip

freeradius recommends no packages.

-- no debconf information



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to