[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2017-865 ---- freeradius

ID: oval:org.secpod.oval:def:1600745Date: (C)2017-08-04   (M)2023-12-20
Class: PATCHFamily: unix




Out-of-bounds read in fr_dhcp_decode_options:An out-of-bounds read flaw was found in the way FreeRADIUS server handles decoding of DHCP packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted DHCP request. Out-of-bounds read in fr_dhcp_decode when decoding option 63:An out-of-bounds read flaw was found in the way FreeRADIUS server handled decoding of DHCP packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted DHCP request. Memory leak in decode_tlv:A memory leak flaw was found in the way FreeRADIUS server handles decoding of DHCP packets. A remote attacker could use this flaw to cause the FreeRADIUS server to consume an increasing amount of memory resources over time possibly leading to a crash due to memory exhaustion. Memory leak in fr_dhcp_decode:A memory leak flaw was found in the way FreeRADIUS server handles decoding of DHCP packets. A remote attacker could use this flaw to cause the FreeRADIUS server to consume an increasing amount of memory resources over time, possibly leading to a crash due to memory exhaustion, by sending specially crafted DHCP packets. Out-of-bounds write in rad_coalesce:An out-of-bounds write flaw was found in the way FreeRADIUS server handled certain attributes in request packets. A remote attacker could use this flaw to crash the FreeRADIUS server or to execute arbitrary code in the context of the FreeRADIUS server process by sending a specially crafted request packet. Out-of-bounds read/write due to improper output buffer size check in make_secret:An out-of-bounds read and write flaw was found in the way FreeRADIUS server handled RADIUS packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted RADIUS packet

Platform:
Amazon Linux AMI
Product:
freeradius
Reference:
ALAS-2017-865
CVE-2017-10982
CVE-2017-10983
CVE-2017-10980
CVE-2017-10981
CVE-2017-10979
CVE-2017-10978
CVE    6
CVE-2017-10981
CVE-2017-10980
CVE-2017-10983
CVE-2017-10982
...
CPE    30
cpe:/a:freeradius:freeradius
cpe:/o:amazon:linux
cpe:/a:freeradius:freeradius:2.0.4
cpe:/a:freeradius:freeradius:2.0.5
...

© SecPod Technologies