CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
96.7%
Issue Overview:
Out-of-bounds read in fr_dhcp_decode_options():
An out-of-bounds read flaw was found in the way FreeRADIUS server handles decoding of DHCP packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted DHCP request. (CVE-2017-10982)
Out-of-bounds read in fr_dhcp_decode() when decoding option 63:
An out-of-bounds read flaw was found in the way FreeRADIUS server handled decoding of DHCP packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted DHCP request. (CVE-2017-10983)
Memory leak in decode_tlv():
A memory leak flaw was found in the way FreeRADIUS server handles decoding of DHCP packets. A remote attacker could use this flaw to cause the FreeRADIUS server to consume an increasing amount of memory resources over time possibly leading to a crash due to memory exhaustion. (CVE-2017-10980)
Memory leak in fr_dhcp_decode():
A memory leak flaw was found in the way FreeRADIUS server handles decoding of DHCP packets. A remote attacker could use this flaw to cause the FreeRADIUS server to consume an increasing amount of memory resources over time, possibly leading to a crash due to memory exhaustion, by sending specially crafted DHCP packets. (CVE-2017-10981)
Out-of-bounds write in rad_coalesce():
An out-of-bounds write flaw was found in the way FreeRADIUS server handled certain attributes in request packets. A remote attacker could use this flaw to crash the FreeRADIUS server or to execute arbitrary code in the context of the FreeRADIUS server process by sending a specially crafted request packet. (CVE-2017-10979)
Out-of-bounds read/write due to improper output buffer size check in make_secret():
An out-of-bounds read and write flaw was found in the way FreeRADIUS server handled RADIUS packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted RADIUS packet. (CVE-2017-10978)
Affected Packages:
freeradius
Issue Correction:
Run yum update freeradius to update your system.
New Packages:
i686:
freeradius-mysql-2.2.6-7.16.amzn1.i686
freeradius-ldap-2.2.6-7.16.amzn1.i686
freeradius-krb5-2.2.6-7.16.amzn1.i686
freeradius-python-2.2.6-7.16.amzn1.i686
freeradius-unixODBC-2.2.6-7.16.amzn1.i686
freeradius-postgresql-2.2.6-7.16.amzn1.i686
freeradius-debuginfo-2.2.6-7.16.amzn1.i686
freeradius-utils-2.2.6-7.16.amzn1.i686
freeradius-perl-2.2.6-7.16.amzn1.i686
freeradius-2.2.6-7.16.amzn1.i686
src:
freeradius-2.2.6-7.16.amzn1.src
x86_64:
freeradius-python-2.2.6-7.16.amzn1.x86_64
freeradius-utils-2.2.6-7.16.amzn1.x86_64
freeradius-mysql-2.2.6-7.16.amzn1.x86_64
freeradius-2.2.6-7.16.amzn1.x86_64
freeradius-debuginfo-2.2.6-7.16.amzn1.x86_64
freeradius-perl-2.2.6-7.16.amzn1.x86_64
freeradius-postgresql-2.2.6-7.16.amzn1.x86_64
freeradius-unixODBC-2.2.6-7.16.amzn1.x86_64
freeradius-ldap-2.2.6-7.16.amzn1.x86_64
freeradius-krb5-2.2.6-7.16.amzn1.x86_64
Red Hat: CVE-2017-10978, CVE-2017-10979, CVE-2017-10980, CVE-2017-10981, CVE-2017-10982, CVE-2017-10983
Mitre: CVE-2017-10978, CVE-2017-10979, CVE-2017-10980, CVE-2017-10981, CVE-2017-10982, CVE-2017-10983
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | freeradius-mysql | < 2.2.6-7.16.amzn1 | freeradius-mysql-2.2.6-7.16.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | freeradius-ldap | < 2.2.6-7.16.amzn1 | freeradius-ldap-2.2.6-7.16.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | freeradius-krb5 | < 2.2.6-7.16.amzn1 | freeradius-krb5-2.2.6-7.16.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | freeradius-python | < 2.2.6-7.16.amzn1 | freeradius-python-2.2.6-7.16.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | freeradius-unixodbc | < 2.2.6-7.16.amzn1 | freeradius-unixODBC-2.2.6-7.16.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | freeradius-postgresql | < 2.2.6-7.16.amzn1 | freeradius-postgresql-2.2.6-7.16.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | freeradius-debuginfo | < 2.2.6-7.16.amzn1 | freeradius-debuginfo-2.2.6-7.16.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | freeradius-utils | < 2.2.6-7.16.amzn1 | freeradius-utils-2.2.6-7.16.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | freeradius-perl | < 2.2.6-7.16.amzn1 | freeradius-perl-2.2.6-7.16.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | freeradius | < 2.2.6-7.16.amzn1 | freeradius-2.2.6-7.16.amzn1.i686.rpm |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
96.7%