Vulnerabilities > CVE-2007-2028 - Unspecified vulnerability in Freeradius
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN freeradius
nessus
Summary
Memory leak in freeRADIUS 1.1.5 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of EAP-TTLS tunnel connections using malformed Diameter format attributes, which causes the authentication request to be rejected but does not reclaim VALUE_PAIR data structures.
Vulnerable Configurations
Nessus
NASL family Fedora Local Security Checks NASL id FEDORA_2007-499.NASL description - Wed May 9 2007 Thomas Woerner <twoerner at redhat.com> 1.1.3-2.fc6 - fixed CVE-2007-2028: EAP-TTLS denial of service Resolves: rhbz#236248 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 25230 published 2007-05-16 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/25230 title Fedora Core 6 : freeradius-1.1.3-2.fc6 (2007-499) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Fedora Security Advisory 2007-499. # include("compat.inc"); if (description) { script_id(25230); script_version ("1.13"); script_cvs_date("Date: 2019/08/02 13:32:26"); script_xref(name:"FEDORA", value:"2007-499"); script_name(english:"Fedora Core 6 : freeradius-1.1.3-2.fc6 (2007-499)"); script_summary(english:"Checks rpm output for the updated packages."); script_set_attribute( attribute:"synopsis", value:"The remote Fedora Core host is missing a security update." ); script_set_attribute( attribute:"description", value: " - Wed May 9 2007 Thomas Woerner <twoerner at redhat.com> 1.1.3-2.fc6 - fixed CVE-2007-2028: EAP-TTLS denial of service Resolves: rhbz#236248 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); # https://lists.fedoraproject.org/pipermail/package-announce/2007-May/001719.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?623336b7" ); script_set_attribute(attribute:"solution", value:"Update the affected packages."); script_set_attribute(attribute:"risk_factor", value:"High"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:freeradius"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:freeradius-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:freeradius-mysql"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:freeradius-postgresql"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:freeradius-unixODBC"); script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora_core:6"); script_set_attribute(attribute:"patch_publication_date", value:"2007/05/14"); script_set_attribute(attribute:"plugin_publication_date", value:"2007/05/16"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc."); script_family(english:"Fedora Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora"); os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora"); os_ver = os_ver[1]; if (! ereg(pattern:"^6([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 6.x", "Fedora " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu); flag = 0; if (rpm_check(release:"FC6", reference:"freeradius-1.1.3-2.fc6")) flag++; if (rpm_check(release:"FC6", reference:"freeradius-debuginfo-1.1.3-2.fc6")) flag++; if (rpm_check(release:"FC6", reference:"freeradius-mysql-1.1.3-2.fc6")) flag++; if (rpm_check(release:"FC6", reference:"freeradius-postgresql-1.1.3-2.fc6")) flag++; if (rpm_check(release:"FC6", reference:"freeradius-unixODBC-1.1.3-2.fc6")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "freeradius / freeradius-debuginfo / freeradius-mysql / etc"); }
NASL family SuSE Local Security Checks NASL id SUSE9_11512.NASL description A memory leak in the code for handling EAP-TTLS tunnels could be exploited by attackers to crash freeradius. (CVE-2007-2028) last seen 2020-06-01 modified 2020-06-02 plugin id 41133 published 2009-09-24 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/41133 title SuSE9 Security Update : freeradius (YOU Patch Number 11512) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The text description of this plugin is (C) Novell, Inc. # include("compat.inc"); if (description) { script_id(41133); script_version("1.6"); script_cvs_date("Date: 2019/10/25 13:36:29"); script_cve_id("CVE-2007-2028"); script_name(english:"SuSE9 Security Update : freeradius (YOU Patch Number 11512)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value:"The remote SuSE 9 host is missing a security-related patch." ); script_set_attribute( attribute:"description", value: "A memory leak in the code for handling EAP-TTLS tunnels could be exploited by attackers to crash freeradius. (CVE-2007-2028)" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2007-2028.html" ); script_set_attribute(attribute:"solution", value:"Apply YOU patch number 11512."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:suse:suse_linux"); script_set_attribute(attribute:"patch_publication_date", value:"2007/05/09"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/09/24"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list"); exit(0); } include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) exit(0, "Local checks are not enabled."); if (!get_kb_item("Host/SuSE/release")) exit(0, "The host is not running SuSE."); if (!get_kb_item("Host/SuSE/rpm-list")) exit(1, "Could not obtain the list of installed packages."); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) exit(1, "Failed to determine the architecture type."); if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") exit(1, "Local checks for SuSE 9 on the '"+cpu+"' architecture have not been implemented."); flag = 0; if (rpm_check(release:"SUSE9", reference:"freeradius-1.0.5-2.17")) flag++; if (rpm_check(release:"SUSE9", reference:"freeradius-devel-1.0.5-2.17")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else exit(0, "The host is not affected.");
NASL family SuSE Local Security Checks NASL id SUSE_FREERADIUS-3287.NASL description A memory leak in the code for handling EAP-TTLS tunnels could be exploited by attackers to crash freeradius. (CVE-2007-2028) last seen 2020-06-01 modified 2020-06-02 plugin id 29435 published 2007-12-13 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/29435 title SuSE 10 Security Update : freeradius (ZYPP Patch Number 3287) NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2007-0338.NASL description From Red Hat Security Advisory 2007:0338 : Updated freeradius packages that fix a memory leak flaw are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. FreeRADIUS is a high-performance and highly configurable free RADIUS server designed to allow centralized authentication and authorization for a network. A memory leak flaw was found in the way FreeRADIUS parses certain authentication requests. A remote attacker could send a specially crafted authentication request which could cause FreeRADIUS to leak a small amount of memory. If enough of these requests are sent, the FreeRADIUS daemon would consume a vast quantity of system memory leading to a possible denial of service. (CVE-2007-2028) Users of FreeRADIUS should update to these erratum packages, which contain a backported patch to correct this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 67489 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67489 title Oracle Linux 3 / 4 / 5 : freeradius (ELSA-2007-0338) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2007-0338.NASL description Updated freeradius packages that fix a memory leak flaw are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. FreeRADIUS is a high-performance and highly configurable free RADIUS server designed to allow centralized authentication and authorization for a network. A memory leak flaw was found in the way FreeRADIUS parses certain authentication requests. A remote attacker could send a specially crafted authentication request which could cause FreeRADIUS to leak a small amount of memory. If enough of these requests are sent, the FreeRADIUS daemon would consume a vast quantity of system memory leading to a possible denial of service. (CVE-2007-2028) Users of FreeRADIUS should update to these erratum packages, which contain a backported patch to correct this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 25213 published 2007-05-11 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25213 title RHEL 3 / 4 / 5 : freeradius (RHSA-2007:0338) NASL family Scientific Linux Local Security Checks NASL id SL_20070510_FREERADIUS_ON_SL3_0_X.NASL description A memory leak flaw was found in the way FreeRADIUS parses certain authentication requests. A remote attacker could send a specially crafted authentication request which could cause FreeRADIUS to leak a small amount of memory. If enough of these requests are sent, the FreeRADIUS daemon would consume a vast quantity of system memory leading to a possible denial of service. (CVE-2007-2028) last seen 2020-06-01 modified 2020-06-02 plugin id 60178 published 2012-08-01 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/60178 title Scientific Linux Security Update : freeradius on SL3.0.x , SL4.x, SL5.x NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2007-085.NASL description Memory leak in freeRADIUS 1.1.5 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of EAP-TTLS tunnel connections using malformed Diameter format attributes, which causes the authentication request to be rejected but does not reclaim VALUE_PAIR data structures. Updated packages have been patched to correct this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 25063 published 2007-04-19 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/25063 title Mandrake Linux Security Advisory : freeradius (MDKSA-2007:085) NASL family SuSE Local Security Checks NASL id SUSE_FREERADIUS-3286.NASL description A memory leak in the code for handling EAP-TTLS tunnels could be exploited by attackers to crash freeradius (CVE-2007-2028). last seen 2020-06-01 modified 2020-06-02 plugin id 27223 published 2007-10-17 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/27223 title openSUSE 10 Security Update : freeradius (freeradius-3286) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200704-14.NASL description The remote host is affected by the vulnerability described in GLSA-200704-14 (FreeRADIUS: Denial of Service) The Coverity Scan project has discovered a memory leak within the handling of certain malformed Diameter format values inside an EAP-TTLS tunnel. Impact : A remote attacker could send a large amount of specially crafted packets to a FreeRADIUS server using EAP-TTLS authentication and exhaust all memory, possibly resulting in a Denial of Service. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 25059 published 2007-04-19 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/25059 title GLSA-200704-14 : FreeRADIUS: Denial of Service NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_C110EDA2E99511DBA9440012F06707F0.NASL description The freeradius development team reports : A malicious 802.1x supplicant could send malformed Diameter format attributes inside of an EAP-TTLS tunnel. The server would reject the authentication request, but would leak one VALUE_PAIR data structure, of approximately 300 bytes. If an attacker performed the attack many times (e.g. thousands or more over a period of minutes to hours), the server could leak megabytes of memory, potentially leading to an last seen 2020-06-01 modified 2020-06-02 plugin id 25051 published 2007-04-19 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25051 title FreeBSD : freeradius -- EAP-TTLS Tunnel Memory Leak Remote DOS Vulnerability (c110eda2-e995-11db-a944-0012f06707f0) NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2007-0338.NASL description Updated freeradius packages that fix a memory leak flaw are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. FreeRADIUS is a high-performance and highly configurable free RADIUS server designed to allow centralized authentication and authorization for a network. A memory leak flaw was found in the way FreeRADIUS parses certain authentication requests. A remote attacker could send a specially crafted authentication request which could cause FreeRADIUS to leak a small amount of memory. If enough of these requests are sent, the FreeRADIUS daemon would consume a vast quantity of system memory leading to a possible denial of service. (CVE-2007-2028) Users of FreeRADIUS should update to these erratum packages, which contain a backported patch to correct this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 25204 published 2007-05-11 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25204 title CentOS 3 / 4 / 5 : freeradius (CESA-2007:0338)
Oval
accepted | 2013-04-29T04:11:56.175-04:00 | ||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||
description | Memory leak in freeRADIUS 1.1.5 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of EAP-TTLS tunnel connections using malformed Diameter format attributes, which causes the authentication request to be rejected but does not reclaim VALUE_PAIR data structures. | ||||||||||||||||||||||||||||||||
family | unix | ||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:11156 | ||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||
submitted | 2010-07-09T03:56:16-04:00 | ||||||||||||||||||||||||||||||||
title | Memory leak in freeRADIUS 1.1.5 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of EAP-TTLS tunnel connections using malformed Diameter format attributes, which causes the authentication request to be rejected but does not reclaim VALUE_PAIR data structures. | ||||||||||||||||||||||||||||||||
version | 27 |
Redhat
advisories |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
rpms |
|
References
- http://rhn.redhat.com/errata/RHSA-2007-0338.html
- http://rhn.redhat.com/errata/RHSA-2007-0338.html
- http://secunia.com/advisories/24849
- http://secunia.com/advisories/24849
- http://secunia.com/advisories/24907
- http://secunia.com/advisories/24907
- http://secunia.com/advisories/24917
- http://secunia.com/advisories/24917
- http://secunia.com/advisories/24996
- http://secunia.com/advisories/24996
- http://secunia.com/advisories/25201
- http://secunia.com/advisories/25201
- http://secunia.com/advisories/25220
- http://secunia.com/advisories/25220
- http://security.gentoo.org/glsa/glsa-200704-14.xml
- http://security.gentoo.org/glsa/glsa-200704-14.xml
- http://www.freeradius.org/security.html
- http://www.freeradius.org/security.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:085
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:085
- http://www.novell.com/linux/security/advisories/2007_10_sr.html
- http://www.novell.com/linux/security/advisories/2007_10_sr.html
- http://www.securityfocus.com/bid/23466
- http://www.securityfocus.com/bid/23466
- http://www.securitytracker.com/id?1018042
- http://www.securitytracker.com/id?1018042
- http://www.trustix.org/errata/2007/0013/
- http://www.trustix.org/errata/2007/0013/
- http://www.vupen.com/english/advisories/2007/1369
- http://www.vupen.com/english/advisories/2007/1369
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11156
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11156