Bug 1468503 (CVE-2017-10983)

Summary: CVE-2017-10983 freeradius: Out-of-bounds read in fr_dhcp_decode() when decoding option 63
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: dpal, jdennis, lemenkov, nikolai.kondrashov, pkis, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: freeradius 2.2.10, freeradius 3.0.15 Doc Type: If docs needed, set a value
Doc Text:
An out-of-bounds read flaw was found in the way FreeRADIUS server handled decoding of DHCP packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted DHCP request.
Story Points: ---
Clone Of: Environment:
Last Closed: 2017-08-02 09:40:22 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1469126, 1469127, 1469412, 1469413, 1471860    
Bug Blocks: 1468570    
Attachments:
Description Flags
Proposed patch 1/2
none
Proposed patch 2/2 none

Description Adam Mariš 2017-07-07 09:17:07 UTC
The fr_dhcp_decode() function performed a strcmp() on binary data in an internal data structure, instead of checking the length of the option and doing a memcmp. The server can read memory until it reaches a zero byte. Depending on memory layout, this read may initiate a page fault, and cause the server to crash.

The security impact is denial of service by any network device capable of sending DHCP packets to FreeRADIUS, which sends a DHCP option 63 with non-zero contents.

Affected versions: 2.0.0 through 3.0.14, inclusive.

Comment 1 Adam Mariš 2017-07-07 09:17:15 UTC
Acknowledgments:

Name: the FreeRADIUS project
Upstream: Guido Vranken

Comment 2 Adam Mariš 2017-07-07 12:11:10 UTC
Created attachment 1295275 [details]
Proposed patch 1/2

Comment 3 Adam Mariš 2017-07-07 12:11:31 UTC
Created attachment 1295276 [details]
Proposed patch 2/2

Comment 10 Dhiru Kholia 2017-07-17 14:35:52 UTC
Created freeradius tracking bugs for this issue:

Affects: fedora-all [bug 1471860]

Comment 11 errata-xmlrpc 2017-07-18 03:42:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2017:1759 https://access.redhat.com/errata/RHSA-2017:1759

Comment 12 errata-xmlrpc 2017-08-01 23:25:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:2389 https://access.redhat.com/errata/RHSA-2017:2389

Comment 13 Dhiru Kholia 2017-08-02 09:47:53 UTC
External References:

http://freeradius.org/security/fuzzer-2017.html