7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.003 Low
EPSS
Percentile
68.0%
CentOS Errata and Security Advisory CESA-2020:3984
FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.
Security Fix(es):
freeradius: privilege escalation due to insecure logrotate configuration (CVE-2019-10143)
freeradius: eap-pwd: Information leak due to aborting when needing more than 10 iterations (CVE-2019-13456)
freeradius: eap-pwd: DoS issues due to multithreaded BN_CTX access (CVE-2019-17185)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-cr-announce/2020-October/032772.html
Affected packages:
freeradius
freeradius-devel
freeradius-doc
freeradius-krb5
freeradius-ldap
freeradius-mysql
freeradius-perl
freeradius-postgresql
freeradius-python
freeradius-sqlite
freeradius-unixODBC
freeradius-utils
Upstream details at:
https://access.redhat.com/errata/RHSA-2020:3984
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 7 | x86_64 | freeradius | < 3.0.13-15.el7 | freeradius-3.0.13-15.el7.x86_64.rpm |
CentOS | 7 | i686 | freeradius-devel | < 3.0.13-15.el7 | freeradius-devel-3.0.13-15.el7.i686.rpm |
CentOS | 7 | x86_64 | freeradius-devel | < 3.0.13-15.el7 | freeradius-devel-3.0.13-15.el7.x86_64.rpm |
CentOS | 7 | x86_64 | freeradius-doc | < 3.0.13-15.el7 | freeradius-doc-3.0.13-15.el7.x86_64.rpm |
CentOS | 7 | x86_64 | freeradius-krb5 | < 3.0.13-15.el7 | freeradius-krb5-3.0.13-15.el7.x86_64.rpm |
CentOS | 7 | x86_64 | freeradius-ldap | < 3.0.13-15.el7 | freeradius-ldap-3.0.13-15.el7.x86_64.rpm |
CentOS | 7 | x86_64 | freeradius-mysql | < 3.0.13-15.el7 | freeradius-mysql-3.0.13-15.el7.x86_64.rpm |
CentOS | 7 | x86_64 | freeradius-perl | < 3.0.13-15.el7 | freeradius-perl-3.0.13-15.el7.x86_64.rpm |
CentOS | 7 | x86_64 | freeradius-postgresql | < 3.0.13-15.el7 | freeradius-postgresql-3.0.13-15.el7.x86_64.rpm |
CentOS | 7 | x86_64 | freeradius-python | < 3.0.13-15.el7 | freeradius-python-3.0.13-15.el7.x86_64.rpm |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.003 Low
EPSS
Percentile
68.0%