Executive Summary
Summary | |
---|---|
Title | Updated freeradius packages fix security flaws |
Informations | |||
---|---|---|---|
Name | RHSA-2004:609 | First vendor Publication | 2004-11-12 |
Vendor | RedHat | Last vendor Modification | 2004-11-12 |
Severity (Vendor) | N/A | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated freeradius packages that fix a number of denial of service vulnerabilities as well as minor bugs are now available for Red Hat Enterprise Linux 3. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 3. Problem description: FreeRADIUS is a high-performance and highly configurable free RADIUS server designed to allow centralized authentication and authorization for a network. A number of flaws were found in FreeRADIUS versions prior to 1.0.1. An attacker who is able to send packets to the server could construct carefully constructed packets in such a way as to cause the server to consume memory or crash. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CAN-2004-0938, CAN-2004-0960, and CAN-2004-0961 to these issues. Users of FreeRADIUS should update to these erratum packages that contain FreeRADIUS 1.0.1, which is not vulnerable to these issues and also corrects a number of bugs. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ 5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info): 127168 - rebuilding freeradius picks up system libeap rather than package libeap 127162 - zlib-devel is missing from BuildRequires in spec file 130606 - Missing buildrequires in freediag 130613 - radiusd.conf specifies other pam-auth than file installed in /etc/pam.d 135825 - CAN-2004-0938 Freeradius < 1.0.1 DoS and remote crash (CAN-2004-0960, CAN-2004-0961) |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2004-609.html |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10024 | |||
Oval ID: | oval:org.mitre.oval:def:10024 | ||
Title: | Memory leak in FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (memory exhaustion) via a series of Access-Request packets with (1) Ascend-Send-Secret, (2) Ascend-Recv-Secret, or (3) Tunnel-Password attributes. | ||
Description: | Memory leak in FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (memory exhaustion) via a series of Access-Request packets with (1) Ascend-Send-Secret, (2) Ascend-Recv-Secret, or (3) Tunnel-Password attributes. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-0961 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:10837 | |||
Oval ID: | oval:org.mitre.oval:def:10837 | ||
Title: | FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (server crash) by sending an Ascend-Send-Secret attribute without the required leading packet. | ||
Description: | FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (server crash) by sending an Ascend-Send-Secret attribute without the required leading packet. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-0938 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:11023 | |||
Oval ID: | oval:org.mitre.oval:def:11023 | ||
Title: | FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (core dump) via malformed USR vendor-specific attributes (VSA) that cause a memcpy operation with a -1 argument. | ||
Description: | FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (core dump) via malformed USR vendor-specific attributes (VSA) that cause a memcpy operation with a -1 argument. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-0960 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1347 | |||
Oval ID: | oval:org.mitre.oval:def:1347 | ||
Title: | FreeRADIUS Ascend-Send-Secret Server Crash | ||
Description: | FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (server crash) by sending an Ascend-Send-Secret attribute without the required leading packet. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-0938 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 3 | Product(s): | FreeRADIUS |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-10-10 | Name : SLES9: Security update for freeradius File : nvt/sles9p5017148.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200409-29 (FreeRADIUS) File : nvt/glsa_200409_29.nasl |
2008-09-04 | Name : FreeBSD Ports: freeradius File : nvt/freebsd_freeradius.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
11807 | FreeRADIUS Malformed USR VSA DoS FreeRadius contains a flaw that may allow a remote denial of service. The issue is triggered when the server recieves a packet with a malformed USR VSA which may cause it to call memcpy with a length value of -1. memcpy interprets this as 0xffffffff which causes it to enter an infinite loop, and will result in loss of availability for the service. |
11806 | FreeRADIUS Access-Request Packet Memory Leak DoS |
10178 | FreeRADIUS Ascend-Send-Secret Processing Remote DoS FreeRADIUS contains a flaw that may allow a remote denial of service. The issue is triggered when an Ascend-Send-Secret packet without an original packet occurs, and will result in loss of availability for the service. |
Snort® IPS/IDS
Date | Description |
---|---|
2019-09-19 | FreeRadius malformed service type field denial of service attempt RuleID : 51085 - Revision : 1 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2005-07-13 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_20dfd1341d3911d99be9000c6e8f12ef.nasl - Type : ACT_GATHER_INFO |
2004-11-13 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2004-609.nasl - Type : ACT_GATHER_INFO |
2004-09-23 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200409-29.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:48:46 |
|