Lucene search

K
amazonAmazonALAS-2017-865
HistoryAug 03, 2017 - 7:11 p.m.

Important: freeradius

2017-08-0319:11:00
alas.aws.amazon.com
8

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.245 Low

EPSS

Percentile

96.6%

Issue Overview:

Out-of-bounds read in fr_dhcp_decode_options():
An out-of-bounds read flaw was found in the way FreeRADIUS server handles decoding of DHCP packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted DHCP request. (CVE-2017-10982)

Out-of-bounds read in fr_dhcp_decode() when decoding option 63:
An out-of-bounds read flaw was found in the way FreeRADIUS server handled decoding of DHCP packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted DHCP request. (CVE-2017-10983)

Memory leak in decode_tlv():
A memory leak flaw was found in the way FreeRADIUS server handles decoding of DHCP packets. A remote attacker could use this flaw to cause the FreeRADIUS server to consume an increasing amount of memory resources over time possibly leading to a crash due to memory exhaustion. (CVE-2017-10980)

Memory leak in fr_dhcp_decode():
A memory leak flaw was found in the way FreeRADIUS server handles decoding of DHCP packets. A remote attacker could use this flaw to cause the FreeRADIUS server to consume an increasing amount of memory resources over time, possibly leading to a crash due to memory exhaustion, by sending specially crafted DHCP packets. (CVE-2017-10981)

Out-of-bounds write in rad_coalesce():
An out-of-bounds write flaw was found in the way FreeRADIUS server handled certain attributes in request packets. A remote attacker could use this flaw to crash the FreeRADIUS server or to execute arbitrary code in the context of the FreeRADIUS server process by sending a specially crafted request packet. (CVE-2017-10979)

Out-of-bounds read/write due to improper output buffer size check in make_secret():
An out-of-bounds read and write flaw was found in the way FreeRADIUS server handled RADIUS packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted RADIUS packet. (CVE-2017-10978)

Affected Packages:

freeradius

Issue Correction:
Run yum update freeradius to update your system.

New Packages:

i686:  
    freeradius-mysql-2.2.6-7.16.amzn1.i686  
    freeradius-ldap-2.2.6-7.16.amzn1.i686  
    freeradius-krb5-2.2.6-7.16.amzn1.i686  
    freeradius-python-2.2.6-7.16.amzn1.i686  
    freeradius-unixODBC-2.2.6-7.16.amzn1.i686  
    freeradius-postgresql-2.2.6-7.16.amzn1.i686  
    freeradius-debuginfo-2.2.6-7.16.amzn1.i686  
    freeradius-utils-2.2.6-7.16.amzn1.i686  
    freeradius-perl-2.2.6-7.16.amzn1.i686  
    freeradius-2.2.6-7.16.amzn1.i686  
  
src:  
    freeradius-2.2.6-7.16.amzn1.src  
  
x86_64:  
    freeradius-python-2.2.6-7.16.amzn1.x86_64  
    freeradius-utils-2.2.6-7.16.amzn1.x86_64  
    freeradius-mysql-2.2.6-7.16.amzn1.x86_64  
    freeradius-2.2.6-7.16.amzn1.x86_64  
    freeradius-debuginfo-2.2.6-7.16.amzn1.x86_64  
    freeradius-perl-2.2.6-7.16.amzn1.x86_64  
    freeradius-postgresql-2.2.6-7.16.amzn1.x86_64  
    freeradius-unixODBC-2.2.6-7.16.amzn1.x86_64  
    freeradius-ldap-2.2.6-7.16.amzn1.x86_64  
    freeradius-krb5-2.2.6-7.16.amzn1.x86_64  

Additional References

Red Hat: CVE-2017-10978, CVE-2017-10979, CVE-2017-10980, CVE-2017-10981, CVE-2017-10982, CVE-2017-10983

Mitre: CVE-2017-10978, CVE-2017-10979, CVE-2017-10980, CVE-2017-10981, CVE-2017-10982, CVE-2017-10983

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.245 Low

EPSS

Percentile

96.6%