Lucene search

K
centosCentOS ProjectCESA-2020:3984
HistoryOct 20, 2020 - 6:02 p.m.

freeradius security update

2020-10-2018:02:54
CentOS Project
lists.centos.org
71

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.003 Low

EPSS

Percentile

68.6%

CentOS Errata and Security Advisory CESA-2020:3984

FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.

Security Fix(es):

  • freeradius: privilege escalation due to insecure logrotate configuration (CVE-2019-10143)

  • freeradius: eap-pwd: Information leak due to aborting when needing more than 10 iterations (CVE-2019-13456)

  • freeradius: eap-pwd: DoS issues due to multithreaded BN_CTX access (CVE-2019-17185)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-cr-announce/2020-October/032772.html

Affected packages:
freeradius
freeradius-devel
freeradius-doc
freeradius-krb5
freeradius-ldap
freeradius-mysql
freeradius-perl
freeradius-postgresql
freeradius-python
freeradius-sqlite
freeradius-unixODBC
freeradius-utils

Upstream details at:
https://access.redhat.com/errata/RHSA-2020:3984

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.003 Low

EPSS

Percentile

68.6%