Debian update for freeradius



Risk Medium
Patch available YES
Number of vulnerabilities 10
CVE-ID CVE-2017-10978
CVE-2017-10979
CVE-2017-10980
CVE-2017-10981
CVE-2017-10982
CVE-2017-10983
CVE-2017-10984
CVE-2017-10985
CVE-2017-10986
CVE-2017-10987
CWE-ID CWE-119
CWE-401
CWE-125
CWE-787
CWE-835
Exploitation vector Network
Public exploit N/A
Vulnerable software
Debian Linux
Operating systems & Components / Operating system

Vendor Debian

Security Bulletin

This security bulletin contains information about 10 vulnerabilities.

1) Buffer overflow

EUVDB-ID: #VU7552

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2017-10978

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to boundary error in make_secret() function when processing RADIUS packets. A remote unauthenticated attacker can send a specially crafted RADIUS packet and crash the affected server.

Successful exploitation of this vulnerability may result in denial of service attack.

Mitigation

Update the affected package to version: 2.2.5+dfsg-0.2+deb8u1, 3.0.12+dfsg-5+deb9u1

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://freeradius.org/security/fuzzer-2017.html#FR-GV-201


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Buffer overflow

EUVDB-ID: #VU7553

Risk: High

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2017-10979

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when processing RADIUS packets in rad_coalesce() function. A remote unauthenticated attacker can send a specially crafted packet with iverly long WiMAX attribute, trigger buffer overflow and crash the affected server or execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected package to version: 2.2.5+dfsg-0.2+deb8u1, 3.0.12+dfsg-5+deb9u1

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://freeradius.org/security/fuzzer-2017.html#FR-GV-202


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Memory leak

EUVDB-ID: #VU7554

Risk: Low

CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-10980

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak in decode_tlv() function when processing DHCP packets. A remote attacker on local network can send specially crafted DHCP packets with option 82 and multiple sub-options  to vulnerable system and trigger denial of service attack.

Mitigation

Update the affected package to version: 2.2.5+dfsg-0.2+deb8u1, 3.0.12+dfsg-5+deb9u1

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://freeradius.org/security/fuzzer-2017.html#FR-GV-203


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Memory leak

EUVDB-ID: #VU7555

Risk: Low

CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-10981

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak in fr_dhcp_decode() function when processing DHCP packets. A remote attacker on local network can send specially crafted DHCP packets with malicious options  to vulnerable system and trigger denial of service attack.

Mitigation

Update the affected package to version: 2.2.5+dfsg-0.2+deb8u1, 3.0.12+dfsg-5+deb9u1

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://freeradius.org/security/fuzzer-2017.html#FR-GV-204


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Out-of-bounds read

EUVDB-ID: #VU7556

Risk: Low

CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-10982

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak in fr_dhcp_decode_options() function when processing DHCP packets. A remote attacker on local network can send specially crafted DHCP packets with malicious options  to vulnerable system and trigger denial of service attack.

Mitigation

Update the affected package to version: 2.2.5+dfsg-0.2+deb8u1, 3.0.12+dfsg-5+deb9u1

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://freeradius.org/security/fuzzer-2017.html#FR-GV-205


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Out-of-bounds read

EUVDB-ID: #VU7557

Risk: Low

CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-10983

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak in fr_dhcp_decode() function when processing DHCP packets. A remote attacker on local network can send specially crafted DHCP option 63 with non-zero contents to vulnerable system and trigger denial of service attack.

Mitigation

Update the affected package to version: 2.2.5+dfsg-0.2+deb8u1, 3.0.12+dfsg-5+deb9u1

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://freeradius.org/security/fuzzer-2017.html#FR-GV-206


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Out-of-bounds write

EUVDB-ID: #VU7558

Risk: High

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2017-10984

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in data2vp_wimax() function when processing WiMAX attributes with "continuation" flag. A remote attacker can send specially crafted packets to vulnerable RADIUS server, trigger out-of-bounds write and crash the affected application or execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update the affected package to version: 2.2.5+dfsg-0.2+deb8u1, 3.0.12+dfsg-5+deb9u1

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://freeradius.org/security/fuzzer-2017.html#FR-GV-301


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Infinite loop

EUVDB-ID: #VU7559

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2017-10985

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service attack.

The vulnerability exists due to infinite loop when processing specially crafted RADIUS packets. A remote attacker can send 4f 02, 89 02, 90 02, or b4 02 attribute data and perform a denial of service attack.

Successful exploitation of the vulnerability may allow an attacker to exhaust all available memory on the system and render the system unresponsive.

Mitigation

Update the affected package to version: 2.2.5+dfsg-0.2+deb8u1, 3.0.12+dfsg-5+deb9u1

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://freeradius.org/security/fuzzer-2017.html#FR-GV-302


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Out-of-bounds read

EUVDB-ID: #VU7560

Risk: Low

CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-10986

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service attack.

The vulnerability exists due to infinite out-of-bounds read in dhcp_attr2vp() function when decoding string options in an array. A remote attacker can send a specially crafted DHCP packet to vulnerable radius server and crash the affected application.

Mitigation

Update the affected package to version: 2.2.5+dfsg-0.2+deb8u1, 3.0.12+dfsg-5+deb9u1

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://freeradius.org/security/fuzzer-2017.html#FR-GV-303


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Out-of-bounds read

EUVDB-ID: #VU7561

Risk: Low

CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-10987

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service attack.

The vulnerability exists due to out-of-bounds read in fr_dhcp_decode_suboptions() function when processing sub-options in DHCP packets. A remote attacker can send a specially crafted DHCP packet to vulnerable radius server and crash the affected application.

Mitigation

Update the affected package to version: 2.2.5+dfsg-0.2+deb8u1, 3.0.12+dfsg-5+deb9u1

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://freeradius.org/security/fuzzer-2017.html#FR-GV-304


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###