9.8
CVSSv3

CVE-2017-10979

Published: 17/07/2017 Updated: 05/01/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

An FR-GV-202 issue in FreeRADIUS 2.x prior to 2.2.10 allows "Write overflow in rad_coalesce()" - this allows remote malicious users to cause a denial of service (daemon crash) or possibly execute arbitrary code.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

freeradius freeradius 2.0.0

freeradius freeradius 2.1.0

freeradius freeradius 2.1.1

freeradius freeradius 2.1.10

freeradius freeradius 2.1.11

freeradius freeradius 2.2.5

freeradius freeradius 2.2.6

freeradius freeradius 2.0.2

freeradius freeradius 2.0.3

freeradius freeradius 2.1.6

freeradius freeradius 2.1.7

freeradius freeradius 2.2.1

freeradius freeradius 2.2.2

freeradius freeradius 2.2.9

freeradius freeradius 2.0.1

freeradius freeradius 2.1.2

freeradius freeradius 2.1.3

freeradius freeradius 2.1.4

freeradius freeradius 2.1.12

freeradius freeradius 2.2.0

freeradius freeradius 2.2.7

freeradius freeradius 2.2.8

freeradius freeradius 2.0.4

freeradius freeradius 2.0.5

freeradius freeradius 2.1.8

freeradius freeradius 2.1.9

freeradius freeradius 2.2.3

freeradius freeradius 2.2.4

Vendor Advisories

Synopsis Important: freeradius security update Type/Severity Security Advisory: Important Topic An update for freeradius is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base ...
Debian Bug report logs - #868765 freeradius: New upstream version 3015 fixing security critical bugs Package: freeradius; Maintainer for freeradius is Debian FreeRADIUS Packaging Team <pkg-freeradius-maintainers@listsaliothdebianorg>; Source for freeradius is src:freeradius (PTS, buildd, popcon) Reported by: Karsten Hey ...
Several security issues were fixed in FreeRADIUS ...
Guido Vranken discovered that FreeRADIUS, an open source implementation of RADIUS, the IETF protocol for AAA (Authorisation, Authentication, and Accounting), did not properly handle memory when processing packets This would allow a remote attacker to cause a denial-of-service by application crash, or potentially execute arbitrary code All those i ...
Out-of-bounds read in fr_dhcp_decode_options():An out-of-bounds read flaw was found in the way FreeRADIUS server handles decoding of DHCP packets A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted DHCP request (CVE-2017-10982) Out-of-bounds read in fr_dhcp_decode() when decoding option 63:An out-of ...
An out-of-bounds write flaw was found in the way FreeRADIUS server handled certain attributes in request packets A remote attacker could use this flaw to crash the FreeRADIUS server or to execute arbitrary code in the context of the FreeRADIUS server process by sending a specially crafted request packet ...
A security issue has been found in freeradius <= 229, where the rad_coalesce() function checks for WiMAX attributes which are too small, but it does not check for WiMAX attributes which are too large As a result, the server can be convinced to read past the end of an attribute, and to write past the end of memory allocated via malloc() A rem ...