7.5
CVSSv3

CVE-2017-10978

Published: 17/07/2017 Updated: 03/07/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

An FR-GV-201 issue in FreeRADIUS 2.x prior to 2.2.10 and 3.x prior to 3.0.15 allows "Read / write overflow in make_secret()" and a denial of service.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

freeradius freeradius

debian debian linux 9.0

debian debian linux 8.0

redhat enterprise linux server aus 7.6

redhat enterprise linux server tus 7.7

redhat enterprise linux server tus 7.6

redhat enterprise linux server tus 7.4

redhat enterprise linux desktop 7.0

redhat enterprise linux server 7.0

redhat enterprise linux server eus 7.4

redhat enterprise linux server eus 7.6

redhat enterprise linux server aus 7.4

redhat enterprise linux workstation 6.0

redhat enterprise linux server eus 7.5

redhat enterprise linux server eus 7.7

redhat enterprise linux server aus 7.7

redhat enterprise linux server 6.0

redhat enterprise linux workstation 7.0

Vendor Advisories

Synopsis Important: freeradius security update Type/Severity Security Advisory: Important Topic An update for freeradius is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base ...
Debian Bug report logs - #868765 freeradius: New upstream version 3015 fixing security critical bugs Package: freeradius; Maintainer for freeradius is Debian FreeRADIUS Packaging Team <pkg-freeradius-maintainers@listsaliothdebianorg>; Source for freeradius is src:freeradius (PTS, buildd, popcon) Reported by: Karsten Hey ...
Several security issues were fixed in FreeRADIUS ...
Guido Vranken discovered that FreeRADIUS, an open source implementation of RADIUS, the IETF protocol for AAA (Authorisation, Authentication, and Accounting), did not properly handle memory when processing packets This would allow a remote attacker to cause a denial-of-service by application crash, or potentially execute arbitrary code All those i ...
Out-of-bounds read in fr_dhcp_decode_options():An out-of-bounds read flaw was found in the way FreeRADIUS server handles decoding of DHCP packets A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted DHCP request (CVE-2017-10982) Out-of-bounds read in fr_dhcp_decode() when decoding option 63:An out-of ...
An out-of-bounds read and write flaw was found in the way FreeRADIUS server handled RADIUS packets A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted RADIUS packet ...
A security issue has been found in freeradius <= 3015, where the make_secret() function does not properly check for output buffer size before writing data A remote attacker with the ability to send packets which are accepted by the server can perform a read or write overflow of up to 16 octets, causing a denial of service ...