![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.882753 |
Categoría: | CentOS Local Security Checks |
Título: | CentOS Update for freeradius CESA-2017:1759 centos6 |
Resumen: | Check the version of freeradius |
Descripción: | Summary: Check the version of freeradius Vulnerability Insight: FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network. Security Fix(es): * An out-of-bounds write flaw was found in the way FreeRADIUS server handled certain attributes in request packets. A remote attacker could use this flaw to crash the FreeRADIUS server or to execute arbitrary code in the context of the FreeRADIUS server process by sending a specially crafted request packet. (CVE-2017-10979) * An out-of-bounds read and write flaw was found in the way FreeRADIUS server handled RADIUS packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted RADIUS packet. (CVE-2017-10978) * Multiple memory leak flaws were found in the way FreeRADIUS server handled decoding of DHCP packets. A remote attacker could use these flaws to cause the FreeRADIUS server to consume an increasing amount of memory resources over time, possibly leading to a crash due to memory exhaustion, by sending specially crafted DHCP packets. (CVE-2017-10980, CVE-2017-10981) * Multiple out-of-bounds read flaws were found in the way FreeRADIUS server handled decoding of DHCP packets. A remote attacker could use these flaws to crash the FreeRADIUS server by sending a specially crafted DHCP request. (CVE-2017-10982, CVE-2017-10983) Red Hat would like to thank the FreeRADIUS project for reporting these issues. Upstream acknowledges Guido Vranken as the original reporter of these issues. Affected Software/OS: freeradius on CentOS 6 Solution: Please Install the Updated Packages. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-10978 BugTraq ID: 99893 http://www.securityfocus.com/bid/99893 Debian Security Information: DSA-3930 (Google Search) http://www.debian.org/security/2017/dsa-3930 RedHat Security Advisories: RHSA-2017:1759 https://access.redhat.com/errata/RHSA-2017:1759 RedHat Security Advisories: RHSA-2017:2389 https://access.redhat.com/errata/RHSA-2017:2389 http://www.securitytracker.com/id/1038914 Common Vulnerability Exposure (CVE) ID: CVE-2017-10979 BugTraq ID: 99901 http://www.securityfocus.com/bid/99901 Common Vulnerability Exposure (CVE) ID: CVE-2017-10980 BugTraq ID: 99905 http://www.securityfocus.com/bid/99905 Common Vulnerability Exposure (CVE) ID: CVE-2017-10981 BugTraq ID: 99898 http://www.securityfocus.com/bid/99898 Common Vulnerability Exposure (CVE) ID: CVE-2017-10982 BugTraq ID: 99912 http://www.securityfocus.com/bid/99912 Common Vulnerability Exposure (CVE) ID: CVE-2017-10983 BugTraq ID: 99915 http://www.securityfocus.com/bid/99915 |
Copyright | Copyright (C) 2017 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |