CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

CVE-2017-10982 Amazon Linux Security Advisory for freeradius: ALAS-2017-865

2017年8月13日 1420点热度 0人点赞 0条评论

漏洞类别:Amazon Linux

漏洞等级:

漏洞信息

Out-of-bounds read in fr_dhcp_decode_options():
An out-of-bounds read flaw was found in the way FreeRADIUS server handles decoding of DHCP packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted DHCP request. (CVE-2017-10982 )

Out-of-bounds read in fr_dhcp_decode() when decoding option 63:
An out-of-bounds read flaw was found in the way FreeRADIUS server handled decoding of DHCP packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted DHCP request. (CVE-2017-10983 )

Memory leak in decode_tlv():
A memory leak flaw was found in the way FreeRADIUS server handles decoding of DHCP packets. A remote attacker could use this flaw to cause the FreeRADIUS server to consume an increasing amount of memory resources over time possibly leading to a crash due to memory exhaustion. (CVE-2017-10980 )

Memory leak in fr_dhcp_decode():
A memory leak flaw was found in the way FreeRADIUS server handles decoding of DHCP packets. A remote attacker could use this flaw to cause the FreeRADIUS server to consume an increasing amount of memory resources over time, possibly leading to a crash due to memory exhaustion, by sending specially crafted DHCP packets. (CVE-2017-10981 )

Out-of-bounds write in rad_coalesce():
An out-of-bounds write flaw was found in the way FreeRADIUS server handled certain attributes in request packets. A remote attacker could use this flaw to crash the FreeRADIUS server or to execute arbitrary code in the context of the FreeRADIUS server process by sending a specially crafted request packet. (CVE-2017-10979 )

Out-of-bounds read/write due to improper output buffer size check in make_secret():
An out-of-bounds read and write flaw was found in the way FreeRADIUS server handled RADIUS packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted RADIUS packet. (CVE-2017-10978 )

QID Detection Logic:
This authenticated QID verifies if the version of the following files is lesser than 2.2.6-7.16.amzn1: freeradius-python, freeradius-utils, freeradius-mysql, freeradius, freeradius-debuginfo, freeradius-perl, freeradius-postgresql, freeradius-unixODBC, freeradius-ldap, freeradius-krb5

漏洞危害

Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.

解决方案

Please refer to Amazon advisory ALAS-2017-865 for affected packages and patching details, or update with your package manager.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

ALAS-2017-865: Amazon Linux (freeradius (2.2.6-7.16.amzn1) on i686)

ALAS-2017-865: Amazon Linux (freeradius (2.2.6-7.16.amzn1) on x86_64)

ALAS-2017-865: Amazon Linux (freeradius (2.2.6-7.16.amzn1) on src)

0daybank

标签: 暂无
最后更新:2017年8月13日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me