Scientific Linux Security Update : freeradius on SL7.x x86_64 (20170802)

critical Nessus Plugin ID 102661

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

Security Fix(es) :

- An out-of-bounds write flaw was found in the way FreeRADIUS server handled certain attributes in request packets. A remote attacker could use this flaw to crash the FreeRADIUS server or to execute arbitrary code in the context of the FreeRADIUS server process by sending a specially crafted request packet. (CVE-2017-10984)

- An out-of-bounds read and write flaw was found in the way FreeRADIUS server handled RADIUS packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted RADIUS packet.
(CVE-2017-10978)

- An out-of-bounds read flaw was found in the way FreeRADIUS server handled decoding of DHCP packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted DHCP request. (CVE-2017-10983)

- A denial of service flaw was found in the way FreeRADIUS server handled certain attributes in request packets. A remote attacker could use this flaw to cause the FreeRADIUS server to enter an infinite loop, consume increasing amounts of memory resources, and ultimately crash by sending a specially crafted request packet.
(CVE-2017-10985)

- Multiple out-of-bounds read flaws were found in the way FreeRADIUS server handled decoding of DHCP packets. A remote attacker could use these flaws to crash the FreeRADIUS server by sending a specially crafted DHCP request. (CVE-2017-10986, CVE-2017-10987)

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?cbef98bf

Plugin Details

Severity: Critical

ID: 102661

File Name: sl_20170802_freeradius_on_SL7_x.nasl

Version: 3.5

Type: local

Agent: unix

Published: 8/22/2017

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:fermilab:scientific_linux:freeradius, p-cpe:/a:fermilab:scientific_linux:freeradius-debuginfo, p-cpe:/a:fermilab:scientific_linux:freeradius-devel, p-cpe:/a:fermilab:scientific_linux:freeradius-doc, p-cpe:/a:fermilab:scientific_linux:freeradius-krb5, p-cpe:/a:fermilab:scientific_linux:freeradius-ldap, p-cpe:/a:fermilab:scientific_linux:freeradius-mysql, p-cpe:/a:fermilab:scientific_linux:freeradius-perl, p-cpe:/a:fermilab:scientific_linux:freeradius-postgresql, p-cpe:/a:fermilab:scientific_linux:freeradius-python, p-cpe:/a:fermilab:scientific_linux:freeradius-sqlite, p-cpe:/a:fermilab:scientific_linux:freeradius-unixodbc, p-cpe:/a:fermilab:scientific_linux:freeradius-utils, x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 8/2/2017

Vulnerability Publication Date: 7/17/2017

Reference Information

CVE: CVE-2017-10978, CVE-2017-10983, CVE-2017-10984, CVE-2017-10985, CVE-2017-10986, CVE-2017-10987