Executive Summary

Summary
Title Updated freeradius packages fix security flaws
Informations
Name RHSA-2004:609 First vendor Publication 2004-11-12
Vendor RedHat Last vendor Modification 2004-11-12
Severity (Vendor) N/A Revision 01

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Problem Description:

Updated freeradius packages that fix a number of denial of service vulnerabilities as well as minor bugs are now available for Red Hat Enterprise Linux 3.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64

3. Problem description:

FreeRADIUS is a high-performance and highly configurable free RADIUS server designed to allow centralized authentication and authorization for a network.

A number of flaws were found in FreeRADIUS versions prior to 1.0.1. An attacker who is able to send packets to the server could construct carefully constructed packets in such a way as to cause the server to consume memory or crash. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CAN-2004-0938, CAN-2004-0960, and CAN-2004-0961 to these issues.

Users of FreeRADIUS should update to these erratum packages that contain FreeRADIUS 1.0.1, which is not vulnerable to these issues and also corrects a number of bugs.

4. Solution:

Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info):

127168 - rebuilding freeradius picks up system libeap rather than package libeap 127162 - zlib-devel is missing from BuildRequires in spec file 130606 - Missing buildrequires in freediag 130613 - radiusd.conf specifies other pam-auth than file installed in /etc/pam.d 135825 - CAN-2004-0938 Freeradius < 1.0.1 DoS and remote crash (CAN-2004-0960, CAN-2004-0961)

Original Source

Url : https://rhn.redhat.com/errata/RHSA-2004-609.html

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:10024
 
Oval ID: oval:org.mitre.oval:def:10024
Title: Memory leak in FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (memory exhaustion) via a series of Access-Request packets with (1) Ascend-Send-Secret, (2) Ascend-Recv-Secret, or (3) Tunnel-Password attributes.
Description: Memory leak in FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (memory exhaustion) via a series of Access-Request packets with (1) Ascend-Send-Secret, (2) Ascend-Recv-Secret, or (3) Tunnel-Password attributes.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0961
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:10837
 
Oval ID: oval:org.mitre.oval:def:10837
Title: FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (server crash) by sending an Ascend-Send-Secret attribute without the required leading packet.
Description: FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (server crash) by sending an Ascend-Send-Secret attribute without the required leading packet.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0938
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:11023
 
Oval ID: oval:org.mitre.oval:def:11023
Title: FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (core dump) via malformed USR vendor-specific attributes (VSA) that cause a memcpy operation with a -1 argument.
Description: FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (core dump) via malformed USR vendor-specific attributes (VSA) that cause a memcpy operation with a -1 argument.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0960
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1347
 
Oval ID: oval:org.mitre.oval:def:1347
Title: FreeRADIUS Ascend-Send-Secret Server Crash
Description: FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (server crash) by sending an Ascend-Send-Secret attribute without the required leading packet.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0938
Version: 3
Platform(s): Red Hat Enterprise Linux 3
Product(s): FreeRADIUS
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 18
Os 2
Os 1

OpenVAS Exploits

Date Description
2009-10-10 Name : SLES9: Security update for freeradius
File : nvt/sles9p5017148.nasl
2008-09-24 Name : Gentoo Security Advisory GLSA 200409-29 (FreeRADIUS)
File : nvt/glsa_200409_29.nasl
2008-09-04 Name : FreeBSD Ports: freeradius
File : nvt/freebsd_freeradius.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
11807 FreeRADIUS Malformed USR VSA DoS

FreeRadius contains a flaw that may allow a remote denial of service. The issue is triggered when the server recieves a packet with a malformed USR VSA which may cause it to call memcpy with a length value of -1. memcpy interprets this as 0xffffffff which causes it to enter an infinite loop, and will result in loss of availability for the service.
11806 FreeRADIUS Access-Request Packet Memory Leak DoS

10178 FreeRADIUS Ascend-Send-Secret Processing Remote DoS

FreeRADIUS contains a flaw that may allow a remote denial of service. The issue is triggered when an Ascend-Send-Secret packet without an original packet occurs, and will result in loss of availability for the service.

Snort® IPS/IDS

Date Description
2019-09-19 FreeRadius malformed service type field denial of service attempt
RuleID : 51085 - Revision : 1 - Type : SERVER-OTHER

Nessus® Vulnerability Scanner

Date Description
2005-07-13 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_20dfd1341d3911d99be9000c6e8f12ef.nasl - Type : ACT_GATHER_INFO
2004-11-13 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2004-609.nasl - Type : ACT_GATHER_INFO
2004-09-23 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200409-29.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:48:46
  • Multiple Updates