CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
98.2%
CentOS Errata and Security Advisory CESA-2017:2389
FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.
Security Fix(es):
An out-of-bounds write flaw was found in the way FreeRADIUS server handled certain attributes in request packets. A remote attacker could use this flaw to crash the FreeRADIUS server or to execute arbitrary code in the context of the FreeRADIUS server process by sending a specially crafted request packet. (CVE-2017-10984)
An out-of-bounds read and write flaw was found in the way FreeRADIUS server handled RADIUS packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted RADIUS packet. (CVE-2017-10978)
An out-of-bounds read flaw was found in the way FreeRADIUS server handled decoding of DHCP packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted DHCP request. (CVE-2017-10983)
A denial of service flaw was found in the way FreeRADIUS server handled certain attributes in request packets. A remote attacker could use this flaw to cause the FreeRADIUS server to enter an infinite loop, consume increasing amounts of memory resources, and ultimately crash by sending a specially crafted request packet. (CVE-2017-10985)
Multiple out-of-bounds read flaws were found in the way FreeRADIUS server handled decoding of DHCP packets. A remote attacker could use these flaws to crash the FreeRADIUS server by sending a specially crafted DHCP request. (CVE-2017-10986, CVE-2017-10987)
Red Hat would like to thank the FreeRADIUS project for reporting these issues. Upstream acknowledges Guido Vranken as the original reporter of these issues.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-cr-announce/2017-August/030928.html
Affected packages:
freeradius
freeradius-devel
freeradius-doc
freeradius-krb5
freeradius-ldap
freeradius-mysql
freeradius-perl
freeradius-postgresql
freeradius-python
freeradius-sqlite
freeradius-unixODBC
freeradius-utils
Upstream details at:
https://access.redhat.com/errata/RHSA-2017:2389
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 7 | x86_64 | freeradius | < 3.0.13-8.el7_4 | freeradius-3.0.13-8.el7_4.x86_64.rpm |
CentOS | 7 | i686 | freeradius-devel | < 3.0.13-8.el7_4 | freeradius-devel-3.0.13-8.el7_4.i686.rpm |
CentOS | 7 | x86_64 | freeradius-devel | < 3.0.13-8.el7_4 | freeradius-devel-3.0.13-8.el7_4.x86_64.rpm |
CentOS | 7 | x86_64 | freeradius-doc | < 3.0.13-8.el7_4 | freeradius-doc-3.0.13-8.el7_4.x86_64.rpm |
CentOS | 7 | x86_64 | freeradius-krb5 | < 3.0.13-8.el7_4 | freeradius-krb5-3.0.13-8.el7_4.x86_64.rpm |
CentOS | 7 | x86_64 | freeradius-ldap | < 3.0.13-8.el7_4 | freeradius-ldap-3.0.13-8.el7_4.x86_64.rpm |
CentOS | 7 | x86_64 | freeradius-mysql | < 3.0.13-8.el7_4 | freeradius-mysql-3.0.13-8.el7_4.x86_64.rpm |
CentOS | 7 | x86_64 | freeradius-perl | < 3.0.13-8.el7_4 | freeradius-perl-3.0.13-8.el7_4.x86_64.rpm |
CentOS | 7 | x86_64 | freeradius-postgresql | < 3.0.13-8.el7_4 | freeradius-postgresql-3.0.13-8.el7_4.x86_64.rpm |
CentOS | 7 | x86_64 | freeradius-python | < 3.0.13-8.el7_4 | freeradius-python-3.0.13-8.el7_4.x86_64.rpm |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
98.2%