A memory leak flaw was found in the way FreeRADIUS server handles decoding of DHCP packets. A remote attacker could use this flaw to cause the FreeRADIUS server to consume an increasing amount of memory resources over time, possibly leading to a crash due to memory exhaustion, by sending specially crafted DHCP packets.
It was discovered that if option decoding fails, the fr_dhcp_decode() function would leak memory.
The security impact is denial of service via memory exhaustion by any network device capable of sending DHCP packets to FreeRADIUS, which sends packets with malformed options.
Affected versions: 2.0.0 through 2.2.9, inclusive.