Amazon Linux AMI : freeradius (ALAS-2017-865)

critical Nessus Plugin ID 102180

Synopsis

The remote Amazon Linux AMI host is missing a security update.

Description

Out-of-bounds read in fr_dhcp_decode_options() :

An out-of-bounds read flaw was found in the way FreeRADIUS server handles decoding of DHCP packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted DHCP request. (CVE-2017-10982)

Out-of-bounds read in fr_dhcp_decode() when decoding option 63 :

An out-of-bounds read flaw was found in the way FreeRADIUS server handled decoding of DHCP packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted DHCP request. (CVE-2017-10983)

Memory leak in decode_tlv() :

A memory leak flaw was found in the way FreeRADIUS server handles decoding of DHCP packets. A remote attacker could use this flaw to cause the FreeRADIUS server to consume an increasing amount of memory resources over time possibly leading to a crash due to memory exhaustion. (CVE-2017-10980)

Memory leak in fr_dhcp_decode() :

A memory leak flaw was found in the way FreeRADIUS server handles decoding of DHCP packets. A remote attacker could use this flaw to cause the FreeRADIUS server to consume an increasing amount of memory resources over time, possibly leading to a crash due to memory exhaustion, by sending specially crafted DHCP packets.
(CVE-2017-10981)

Out-of-bounds write in rad_coalesce() :

An out-of-bounds write flaw was found in the way FreeRADIUS server handled certain attributes in request packets. A remote attacker could use this flaw to crash the FreeRADIUS server or to execute arbitrary code in the context of the FreeRADIUS server process by sending a specially crafted request packet. (CVE-2017-10979)

Out-of-bounds read/write due to improper output buffer size check in make_secret() :

An out-of-bounds read and write flaw was found in the way FreeRADIUS server handled RADIUS packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted RADIUS packet. (CVE-2017-10978)

Solution

Run 'yum update freeradius' to update your system.

See Also

https://alas.aws.amazon.com/ALAS-2017-865.html

Plugin Details

Severity: Critical

ID: 102180

File Name: ala_ALAS-2017-865.nasl

Version: 3.3

Type: local

Agent: unix

Published: 8/4/2017

Updated: 4/18/2018

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:freeradius-unixodbc, p-cpe:/a:amazon:linux:freeradius-debuginfo, p-cpe:/a:amazon:linux:freeradius-ldap, p-cpe:/a:amazon:linux:freeradius-krb5, p-cpe:/a:amazon:linux:freeradius, p-cpe:/a:amazon:linux:freeradius-postgresql, p-cpe:/a:amazon:linux:freeradius-python, p-cpe:/a:amazon:linux:freeradius-perl, cpe:/o:amazon:linux, p-cpe:/a:amazon:linux:freeradius-mysql, p-cpe:/a:amazon:linux:freeradius-utils

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Patch Publication Date: 8/3/2017

Reference Information

CVE: CVE-2017-10978, CVE-2017-10979, CVE-2017-10980, CVE-2017-10981, CVE-2017-10982, CVE-2017-10983

ALAS: 2017-865