|Summary:||CVE-2019-11235 freeradius: eap-pwd: authentication bypass via an invalid curve attack|
|Product:||[Other] Security Response||Reporter:||Laura Pardo <lpardo>|
|Component:||vulnerability||Assignee:||Red Hat Product Security <security-response-team>|
|Status:||CLOSED ERRATA||QA Contact:|
|Version:||unspecified||CC:||ascheel, dpal, fdvorak, jdennis, lemenkov, nikolai.kondrashov, pkis, rharwood, rschiron, security-response-team|
|Fixed In Version:||freeradius 3.0.19||Doc Type:||If docs needed, set a value|
A vulnerability was found in FreeRadius. An invalid curve attack allows an attacker to authenticate as any user, without knowing the password. FreeRADIUS doesn't verify whether the received elliptic curve point is valid. The highest threat from this vulnerability is to data confidentiality and integrity.
|Last Closed:||2019-06-10 10:53:11 UTC||Type:||---|
|oVirt Team:||---||RHEL 7.3 requirements from Atomic Host:|
|Cloudforms Team:||---||Target Upstream Version:|
|Bug Depends On:||1699413, 1699414, 1699415, 1699416, 1699417, 1699418|
Description Laura Pardo 2019-04-03 17:38:33 UTC
A vulnerability was found in FreeRadius. An invalid curve attack allows an attacker to authenticate as any user (without knowing the password). The problem is that on the reception of an EAP-PWD Commit frame, FreeRADIUS doesn't verify whether the received elliptic curve point is valid.
Comment 2 Tomas Hoger 2019-04-11 20:21:58 UTC
Public now via upstream security page: https://freeradius.org/security/ Fixed upstream in freeradius 3.0.19: http://freeradius.org/release_notes/?br=3.0.x&re=3.0.19 Upstream commit: https://github.com/FreeRADIUS/freeradius-server/commit/85497b5ff37ccb656895b826b88585898c209586 https://github.com/FreeRADIUS/freeradius-server/commit/ab4c767099f263a7cd4109bcdca80ee74210a769
Comment 3 Tomas Hoger 2019-04-11 20:34:09 UTC
EAP-PWD support was first added in freeradius 3.0.0, so earlier versions as shipped in Red Hat Enterprise Linux 6 and earlier are not affected.
Comment 5 Riccardo Schirone 2019-04-12 16:09:53 UTC
Created freeradius tracking bugs for this issue: Affects: fedora-all [bug 1699415]
Comment 7 Riccardo Schirone 2019-04-15 13:58:05 UTC
When a EAP-PWD Commit frame is received, a vulnerable implementation does not check that the received point is on the elliptic curve and that is not at infinity and/or it does not check that the received scalar is within the right range. Those conditions should be checked and the handshake should be aborted if the data is not valid.
Comment 14 errata-xmlrpc 2019-05-09 15:09:22 UTC
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:1131 https://access.redhat.com/errata/RHSA-2019:1131