![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.871859 |
Categoría: | Red Hat Local Security Checks |
Título: | RedHat Update for freeradius RHSA-2017:2389-01 |
Resumen: | The remote host is missing an update for the 'freeradius'; package(s) announced via the referenced advisory. |
Descripción: | Summary: The remote host is missing an update for the 'freeradius' package(s) announced via the referenced advisory. Vulnerability Insight: FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network. Security Fix(es): * An out-of-bounds write flaw was found in the way FreeRADIUS server handled certain attributes in request packets. A remote attacker could use this flaw to crash the FreeRADIUS server or to execute arbitrary code in the context of the FreeRADIUS server process by sending a specially crafted request packet. (CVE-2017-10984) * An out-of-bounds read and write flaw was found in the way FreeRADIUS server handled RADIUS packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted RADIUS packet. (CVE-2017-10978) * An out-of-bounds read flaw was found in the way FreeRADIUS server handled decoding of DHCP packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted DHCP request. (CVE-2017-10983) * A denial of service flaw was found in the way FreeRADIUS server handled certain attributes in request packets. A remote attacker could use this flaw to cause the FreeRADIUS server to enter an infinite loop, consume increasing amounts of memory resources, and ultimately crash by sending a specially crafted request packet. (CVE-2017-10985) * Multiple out-of-bounds read flaws were found in the way FreeRADIUS server handled decoding of DHCP packets. A remote attacker could use these flaws to crash the FreeRADIUS server by sending a specially crafted DHCP request. (CVE-2017-10986, CVE-2017-10987) Red Hat would like to thank the FreeRADIUS project for reporting these issues. Upstream acknowledges Guido Vranken as the original reporter of these issues. Affected Software/OS: freeradius on Red Hat Enterprise Linux Server (v. 7) Solution: Please Install the Updated Packages. CVSS Score: 7.8 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-10978 BugTraq ID: 99893 http://www.securityfocus.com/bid/99893 Debian Security Information: DSA-3930 (Google Search) http://www.debian.org/security/2017/dsa-3930 RedHat Security Advisories: RHSA-2017:1759 https://access.redhat.com/errata/RHSA-2017:1759 RedHat Security Advisories: RHSA-2017:2389 https://access.redhat.com/errata/RHSA-2017:2389 http://www.securitytracker.com/id/1038914 Common Vulnerability Exposure (CVE) ID: CVE-2017-10983 BugTraq ID: 99915 http://www.securityfocus.com/bid/99915 Common Vulnerability Exposure (CVE) ID: CVE-2017-10984 BugTraq ID: 99876 http://www.securityfocus.com/bid/99876 Common Vulnerability Exposure (CVE) ID: CVE-2017-10985 BugTraq ID: 99968 http://www.securityfocus.com/bid/99968 Common Vulnerability Exposure (CVE) ID: CVE-2017-10986 BugTraq ID: 99971 http://www.securityfocus.com/bid/99971 Common Vulnerability Exposure (CVE) ID: CVE-2017-10987 BugTraq ID: 99970 http://www.securityfocus.com/bid/99970 |
Copyright | Copyright (C) 2017 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |