Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.871859
Categoría:Red Hat Local Security Checks
Título:RedHat Update for freeradius RHSA-2017:2389-01
Resumen:The remote host is missing an update for the 'freeradius'; package(s) announced via the referenced advisory.
Descripción:Summary:
The remote host is missing an update for the 'freeradius'
package(s) announced via the referenced advisory.

Vulnerability Insight:
FreeRADIUS is a high-performance and highly
configurable free Remote Authentication Dial In User Service (RADIUS) server,
designed to allow centralized authentication and authorization for a network.
Security Fix(es): * An out-of-bounds write flaw was found in the way FreeRADIUS
server handled certain attributes in request packets. A remote attacker could
use this flaw to crash the FreeRADIUS server or to execute arbitrary code in the
context of the FreeRADIUS server process by sending a specially crafted request
packet. (CVE-2017-10984) * An out-of-bounds read and write flaw was found in the
way FreeRADIUS server handled RADIUS packets. A remote attacker could use this
flaw to crash the FreeRADIUS server by sending a specially crafted RADIUS
packet. (CVE-2017-10978) * An out-of-bounds read flaw was found in the way
FreeRADIUS server handled decoding of DHCP packets. A remote attacker could use
this flaw to crash the FreeRADIUS server by sending a specially crafted DHCP
request. (CVE-2017-10983) * A denial of service flaw was found in the way
FreeRADIUS server handled certain attributes in request packets. A remote
attacker could use this flaw to cause the FreeRADIUS server to enter an infinite
loop, consume increasing amounts of memory resources, and ultimately crash by
sending a specially crafted request packet. (CVE-2017-10985) * Multiple
out-of-bounds read flaws were found in the way FreeRADIUS server handled
decoding of DHCP packets. A remote attacker could use these flaws to crash the
FreeRADIUS server by sending a specially crafted DHCP request. (CVE-2017-10986,
CVE-2017-10987) Red Hat would like to thank the FreeRADIUS project for reporting
these issues. Upstream acknowledges Guido Vranken as the original reporter of
these issues.

Affected Software/OS:
freeradius on Red Hat Enterprise Linux Server (v. 7)

Solution:
Please Install the Updated Packages.

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2017-10978
BugTraq ID: 99893
http://www.securityfocus.com/bid/99893
Debian Security Information: DSA-3930 (Google Search)
http://www.debian.org/security/2017/dsa-3930
RedHat Security Advisories: RHSA-2017:1759
https://access.redhat.com/errata/RHSA-2017:1759
RedHat Security Advisories: RHSA-2017:2389
https://access.redhat.com/errata/RHSA-2017:2389
http://www.securitytracker.com/id/1038914
Common Vulnerability Exposure (CVE) ID: CVE-2017-10983
BugTraq ID: 99915
http://www.securityfocus.com/bid/99915
Common Vulnerability Exposure (CVE) ID: CVE-2017-10984
BugTraq ID: 99876
http://www.securityfocus.com/bid/99876
Common Vulnerability Exposure (CVE) ID: CVE-2017-10985
BugTraq ID: 99968
http://www.securityfocus.com/bid/99968
Common Vulnerability Exposure (CVE) ID: CVE-2017-10986
BugTraq ID: 99971
http://www.securityfocus.com/bid/99971
Common Vulnerability Exposure (CVE) ID: CVE-2017-10987
BugTraq ID: 99970
http://www.securityfocus.com/bid/99970
CopyrightCopyright (C) 2017 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.