Univention Bugzilla – Bug 37076
freeradius: Denial of service (4.1)
Last modified: 2019-04-11 19:23:34 CEST
+++ This bug was initially created as a clone of Bug #34404 +++ Denial of service in rlm_pap (CVE-2014-2015)
Classified as "Minor issue" in Debian.
The issue classified as minor issues. Removing target milestone.
Upstream Debian package version 2.1.12+dfsg-1.2+deb7u1 fixes: * FreeRADIUS does not properly check revocation of intermediate CA certificates. (CVE-2015-4680) * The TLS session cache in FreeRADIUS fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS. (CVE-2017-9148)
Upstream Debian package version 2.1.12+dfsg-1.2+deb7u2 fixes: * "Read / write overflow in make_secret()" and a denial of service. (CVE-2017-10978) * "Write overflow in rad_coalesce()" - this allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code. (CVE-2017-10979) * "DHCP - Memory leak in decode_tlv()" and a denial of service. (CVE-2017-10980) * "DHCP - Memory leak in fr_dhcp_decode()" and a denial of service. (CVE-2017-10981) * "DHCP - Buffer over-read in fr_dhcp_decode_options()" and a denial of service. (CVE-2017-10982) * "DHCP - Read overflow when decoding option 63" and a denial of service. (CVE-2017-10983)
This issue has been filed against UCS 4.1. UCS 4.1 is out of maintenance and many UCS components have vastly changed in later releases. Thus, this issue is now being closed. If this issue still occurs in newer UCS versions, please use "Clone this bug" or reopen this issue. In this case please provide detailed information on how this issue is affecting you.