Debian Security Advisory DSA 1089-1 (freeradius)

Summary
The remote host is missing an update to freeradius announced via advisory DSA 1089-1. Several problems have been discovered in freeradius, a high-performance and highly configurable RADIUS server. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2005-4744 SuSE researchers have discovered several off-by-one errors may allow remote attackers to cause a denial of service and possibly execute arbitrary code. CVE-2006-1354 Due to insufficient input validation it is possible for a remote attacker to bypass authentication or cause a denial of service. The old stable distribution (woody) does not contain this package.
Solution
For the stable distribution (sarge) this problem has been fixed in version 1.0.2-4sarge1. For the unstable distribution (sid) this problem has been fixed in version 1.1.0-1.2. We recommend that you upgrade your freeradius package. https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201089-1