Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.882753
Kategorie:CentOS Local Security Checks
Titel:CentOS Update for freeradius CESA-2017:1759 centos6
Zusammenfassung:Check the version of freeradius
Beschreibung:Summary:
Check the version of freeradius

Vulnerability Insight:
FreeRADIUS is a high-performance and highly
configurable free Remote Authentication Dial In User Service (RADIUS) server,
designed to allow centralized authentication and authorization for a network.

Security Fix(es):

* An out-of-bounds write flaw was found in the way FreeRADIUS server
handled certain attributes in request packets. A remote attacker could use
this flaw to crash the FreeRADIUS server or to execute arbitrary code in
the context of the FreeRADIUS server process by sending a specially crafted
request packet. (CVE-2017-10979)

* An out-of-bounds read and write flaw was found in the way FreeRADIUS
server handled RADIUS packets. A remote attacker could use this flaw to
crash the FreeRADIUS server by sending a specially crafted RADIUS packet.
(CVE-2017-10978)

* Multiple memory leak flaws were found in the way FreeRADIUS server
handled decoding of DHCP packets. A remote attacker could use these flaws
to cause the FreeRADIUS server to consume an increasing amount of memory
resources over time, possibly leading to a crash due to memory exhaustion,
by sending specially crafted DHCP packets. (CVE-2017-10980, CVE-2017-10981)

* Multiple out-of-bounds read flaws were found in the way FreeRADIUS server
handled decoding of DHCP packets. A remote attacker could use these flaws
to crash the FreeRADIUS server by sending a specially crafted DHCP request.
(CVE-2017-10982, CVE-2017-10983)

Red Hat would like to thank the FreeRADIUS project for reporting these
issues. Upstream acknowledges Guido Vranken as the original reporter of
these issues.

Affected Software/OS:
freeradius on CentOS 6

Solution:
Please Install the Updated Packages.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2017-10978
BugTraq ID: 99893
http://www.securityfocus.com/bid/99893
Debian Security Information: DSA-3930 (Google Search)
http://www.debian.org/security/2017/dsa-3930
RedHat Security Advisories: RHSA-2017:1759
https://access.redhat.com/errata/RHSA-2017:1759
RedHat Security Advisories: RHSA-2017:2389
https://access.redhat.com/errata/RHSA-2017:2389
http://www.securitytracker.com/id/1038914
Common Vulnerability Exposure (CVE) ID: CVE-2017-10979
BugTraq ID: 99901
http://www.securityfocus.com/bid/99901
Common Vulnerability Exposure (CVE) ID: CVE-2017-10980
BugTraq ID: 99905
http://www.securityfocus.com/bid/99905
Common Vulnerability Exposure (CVE) ID: CVE-2017-10981
BugTraq ID: 99898
http://www.securityfocus.com/bid/99898
Common Vulnerability Exposure (CVE) ID: CVE-2017-10982
BugTraq ID: 99912
http://www.securityfocus.com/bid/99912
Common Vulnerability Exposure (CVE) ID: CVE-2017-10983
BugTraq ID: 99915
http://www.securityfocus.com/bid/99915
CopyrightCopyright (C) 2017 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.