Debian Security Advisory DSA 659-1 (libpam-radius-auth)

Summary
The remote host is missing an update to libpam-radius-auth announced via advisory DSA 659-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20659-1
Insight
Two problems have been discovered in the libpam-radius-auth package, the PAM RADIUS authentication module. The Common Vulnerabilities and Exposures Project identifies the following problems: CVE-2004-1340 The Debian package accidently installed its configuration file /etc/pam_radius_auth.conf world-readable. Since it may possibly contain secrets all local users are able to read them if the administrator hasn't adjusted file permissions. This problem is Debian specific. CVE-2005-0108 Leon Juranic discoverd an integer underflow in the mod_auth_radius module for Apache which is also present in libpam-radius-auth. For the stable distribution (woody) these problems have been fixed in version 1.3.14-1.3. For the unstable distribution (sid) these problems have been fixed in version 1.3.16-3. We recommend that you upgrade your libpam-radius-auth package.