Executive Summary
Summary | |
---|---|
Title | freeradius security update |
Informations | |||
---|---|---|---|
Name | RHSA-2007:0338 | First vendor Publication | 2007-05-10 |
Vendor | RedHat | Last vendor Modification | 2007-05-10 |
Severity (Vendor) | Moderate | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated freeradius packages that fix a memory leak flaw are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Problem description: FreeRADIUS is a high-performance and highly configurable free RADIUS server designed to allow centralized authentication and authorization for a network. A memory leak flaw was found in the way FreeRADIUS parses certain authentication requests. A remote attacker could send a specially crafted authentication request which could cause FreeRADIUS to leak a small amount of memory. If enough of these requests are sent, the FreeRADIUS daemon would consume a vast quantity of system memory leading to a possible denial of service. (CVE-2007-2028) Users of FreeRADIUS should update to these erratum packages, which contain a backported patch to correct this issue. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bug IDs fixed (http://bugzilla.redhat.com/): 236247 - CVE-2007-2028 Freeradius EAP-TTLS denial of service |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2007-0338.html |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:11156 | |||
Oval ID: | oval:org.mitre.oval:def:11156 | ||
Title: | Memory leak in freeRADIUS 1.1.5 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of EAP-TTLS tunnel connections using malformed Diameter format attributes, which causes the authentication request to be rejected but does not reclaim VALUE_PAIR data structures. | ||
Description: | Memory leak in freeRADIUS 1.1.5 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of EAP-TTLS tunnel connections using malformed Diameter format attributes, which causes the authentication request to be rejected but does not reclaim VALUE_PAIR data structures. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-2028 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22329 | |||
Oval ID: | oval:org.mitre.oval:def:22329 | ||
Title: | ELSA-2007:0338: freeradius security update (Moderate) | ||
Description: | Memory leak in freeRADIUS 1.1.5 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of EAP-TTLS tunnel connections using malformed Diameter format attributes, which causes the authentication request to be rejected but does not reclaim VALUE_PAIR data structures. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2007:0338-02 CVE-2007-2028 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | freeradius |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-10-10 | Name : SLES9: Security update for freeradius File : nvt/sles9p5020911.nasl |
2009-04-09 | Name : Mandriva Update for freeradius MDKSA-2007:085 (freeradius) File : nvt/gb_mandriva_MDKSA_2007_085.nasl |
2009-02-27 | Name : Fedora Update for freeradius FEDORA-2007-499 File : nvt/gb_fedora_2007_499_freeradius_fc6.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200704-14 (FreeRADIUS) File : nvt/glsa_200704_14.nasl |
2008-09-04 | Name : FreeBSD Ports: freeradius, freeradius-mysql File : nvt/freebsd_freeradius4.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
34912 | FreeRADIUS Malformed EAP-TTLS Connections Memory Exhaustion Remote DoS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2007-0338.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20070510_freeradius_on_SL3_0_x.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_11512.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_freeradius-3287.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_freeradius-3286.nasl - Type : ACT_GATHER_INFO |
2007-05-16 | Name : The remote Fedora Core host is missing a security update. File : fedora_2007-499.nasl - Type : ACT_GATHER_INFO |
2007-05-11 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2007-0338.nasl - Type : ACT_GATHER_INFO |
2007-05-11 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2007-0338.nasl - Type : ACT_GATHER_INFO |
2007-04-19 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_c110eda2e99511dba9440012f06707f0.nasl - Type : ACT_GATHER_INFO |
2007-04-19 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200704-14.nasl - Type : ACT_GATHER_INFO |
2007-04-19 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2007-085.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:50:38 |
|