Vulnerability identifier: #VU7556
Vulnerability risk: Low
CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-125
Exploitation vector: Local network
Exploit availability: No
Vulnerable software:
FreeRADIUS
Server applications /
Directory software, identity management
Vendor: FreeRADIUS Server Project
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak in fr_dhcp_decode_options() function when processing DHCP packets. A remote attacker on local network can send specially crafted DHCP packets with malicious options to vulnerable system and trigger denial of service attack.
Mitigation
Update to version 2.2.10.
Vulnerable software versions
FreeRADIUS: 2.2.0 - 2.2.9
External links
https://freeradius.org/security/fuzzer-2017.html#FR-GV-205
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.