freeradius -- authentication bypass vulnerability

2006-06-03T00:00:00
ID 1A216DFD-F710-11DA-9156-000E0C2E438A
Type freebsd
Reporter FreeBSD
Modified 2006-06-03T00:00:00

Description

The freeradius development team reports:

A validation issue exists with the EAP-MSCHAPv2 module in all versions from 1.0.0 (where the module first appeared) to 1.1.0. Insufficient input validation was being done in the EAP-MSCHAPv2 state machine. A malicious attacker could manipulate their EAP-MSCHAPv2 client state machine to potentially convince the server to bypass authentication checks. This bypassing could also result in the server crashing