5
CVSSv2

CVE-2017-10983

Published: 17/07/2017 Updated: 05/01/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

An FR-GV-206 issue in FreeRADIUS 2.x prior to 2.2.10 and 3.x prior to 3.0.15 allows "DHCP - Read overflow when decoding option 63" and a denial of service.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

freeradius freeradius 2.0.0

freeradius freeradius 2.1.1

freeradius freeradius 2.1.2

freeradius freeradius 2.1.3

freeradius freeradius 2.1.11

freeradius freeradius 2.1.12

freeradius freeradius 2.2.6

freeradius freeradius 2.2.7

freeradius freeradius 3.0.8

freeradius freeradius 3.0.7

freeradius freeradius 3.0.0

freeradius freeradius 3.0.14

freeradius freeradius 2.0.5

freeradius freeradius 2.1.0

freeradius freeradius 2.1.9

freeradius freeradius 2.1.10

freeradius freeradius 2.2.4

freeradius freeradius 2.2.5

freeradius freeradius 3.0.11

freeradius freeradius 3.0.10

freeradius freeradius 3.0.9

freeradius freeradius 3.0.2

freeradius freeradius 3.0.1

freeradius freeradius 2.0.3

freeradius freeradius 2.0.4

freeradius freeradius 2.1.7

freeradius freeradius 2.1.8

freeradius freeradius 2.2.2

freeradius freeradius 2.2.3

freeradius freeradius 3.0.13

freeradius freeradius 3.0.12

freeradius freeradius 3.0.4

freeradius freeradius 3.0.3

freeradius freeradius 2.0.1

freeradius freeradius 2.0.2

freeradius freeradius 2.1.4

freeradius freeradius 2.1.6

freeradius freeradius 2.2.0

freeradius freeradius 2.2.1

freeradius freeradius 2.2.8

freeradius freeradius 2.2.9

freeradius freeradius 3.0.6

freeradius freeradius 3.0.5

Vendor Advisories

Synopsis Important: freeradius security update Type/Severity Security Advisory: Important Topic An update for freeradius is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base ...
Debian Bug report logs - #868765 freeradius: New upstream version 3015 fixing security critical bugs Package: freeradius; Maintainer for freeradius is Debian FreeRADIUS Packaging Team <pkg-freeradius-maintainers@listsaliothdebianorg>; Source for freeradius is src:freeradius (PTS, buildd, popcon) Reported by: Karsten Hey ...
Several security issues were fixed in FreeRADIUS ...
Guido Vranken discovered that FreeRADIUS, an open source implementation of RADIUS, the IETF protocol for AAA (Authorisation, Authentication, and Accounting), did not properly handle memory when processing packets This would allow a remote attacker to cause a denial-of-service by application crash, or potentially execute arbitrary code All those i ...
Out-of-bounds read in fr_dhcp_decode_options():An out-of-bounds read flaw was found in the way FreeRADIUS server handles decoding of DHCP packets A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted DHCP request (CVE-2017-10982) Out-of-bounds read in fr_dhcp_decode() when decoding option 63:An out-of ...
An out-of-bounds read flaw was found in the way FreeRADIUS server handled decoding of DHCP packets A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted DHCP request ...
A security issue has been found in freeradius <= 3015, where the fr_dhcp_decode() function performed a strcmp() on binary data in an internal data structure, instead of checking the length of the option and doing a memcmp A remote attacker with the ability to send packets which are accepted by the server can make the server read its memory un ...