Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.871844
Categoría:Red Hat Local Security Checks
Título:RedHat Update for freeradius RHSA-2017:1759-01
Resumen:The remote host is missing an update for the 'freeradius'; package(s) announced via the referenced advisory.
Descripción:Summary:
The remote host is missing an update for the 'freeradius'
package(s) announced via the referenced advisory.

Vulnerability Insight:
FreeRADIUS is a high-performance and highly
configurable free Remote Authentication Dial In User Service (RADIUS) server,
designed to allow centralized authentication and authorization for a network.

Security Fix(es):

* An out-of-bounds write flaw was found in the way FreeRADIUS server
handled certain attributes in request packets. A remote attacker could use
this flaw to crash the FreeRADIUS server or to execute arbitrary code in
the context of the FreeRADIUS server process by sending a specially crafted
request packet. (CVE-2017-10979)

* An out-of-bounds read and write flaw was found in the way FreeRADIUS
server handled RADIUS packets. A remote attacker could use this flaw to
crash the FreeRADIUS server by sending a specially crafted RADIUS packet.
(CVE-2017-10978)

* Multiple memory leak flaws were found in the way FreeRADIUS server
handled decoding of DHCP packets. A remote attacker could use these flaws
to cause the FreeRADIUS server to consume an increasing amount of memory
resources over time, possibly leading to a crash due to memory exhaustion,
by sending specially crafted DHCP packets. (CVE-2017-10980, CVE-2017-10981)

* Multiple out-of-bounds read flaws were found in the way FreeRADIUS server
handled decoding of DHCP packets. A remote attacker could use these flaws
to crash the FreeRADIUS server by sending a specially crafted DHCP request.
(CVE-2017-10982, CVE-2017-10983)

Red Hat would like to thank the FreeRADIUS project for reporting these
issues. Upstream acknowledges Guido Vranken as the original reporter of
these issues.

Affected Software/OS:
freeradius on
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)

Solution:
Please Install the Updated Packages.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2017-10978
BugTraq ID: 99893
http://www.securityfocus.com/bid/99893
Debian Security Information: DSA-3930 (Google Search)
http://www.debian.org/security/2017/dsa-3930
RedHat Security Advisories: RHSA-2017:1759
https://access.redhat.com/errata/RHSA-2017:1759
RedHat Security Advisories: RHSA-2017:2389
https://access.redhat.com/errata/RHSA-2017:2389
http://www.securitytracker.com/id/1038914
Common Vulnerability Exposure (CVE) ID: CVE-2017-10979
BugTraq ID: 99901
http://www.securityfocus.com/bid/99901
Common Vulnerability Exposure (CVE) ID: CVE-2017-10980
BugTraq ID: 99905
http://www.securityfocus.com/bid/99905
Common Vulnerability Exposure (CVE) ID: CVE-2017-10981
BugTraq ID: 99898
http://www.securityfocus.com/bid/99898
Common Vulnerability Exposure (CVE) ID: CVE-2017-10982
BugTraq ID: 99912
http://www.securityfocus.com/bid/99912
Common Vulnerability Exposure (CVE) ID: CVE-2017-10983
BugTraq ID: 99915
http://www.securityfocus.com/bid/99915
CopyrightCopyright (C) 2017 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.