Bug 1737663 (CVE-2019-13456)
Summary: | CVE-2019-13456 freeradius: eap-pwd: Information leak due to aborting when needing more than 10 iterations | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | ascheel, dpal, lemenkov, nikolai.kondrashov, pkis, rharwood, rschiron |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
An information leak was discovered in the implementation of EAP-pwd in freeradius. An attacker could initiate several EAP-pwd handshakes to leak information, which can then be used to recover the user's WiFi password by performing dictionary and brute-force attacks.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-04-28 16:33:36 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1737664, 1751796, 1751797, 1751798 | ||
Bug Blocks: | 1740725 |
Description
Pedro Sampaio
2019-08-06 01:38:06 UTC
Created freeradius tracking bugs for this issue: Affects: fedora-all [bug 1737664] Upstream patch: https://github.com/FreeRADIUS/freeradius-server/commit/3ea2a5a026e73d81cd9a3e9bbd4300c433004bfa EAP-PWD support was first added in freeradius 3.0.0, so earlier versions as shipped in Red Hat Enterprise Linux 6 and earlier are not affected. Statement: This issue did not affect the versions of freeradius as shipped with Red Hat Enterprise Linux 5, and 6 as they did not include support for EAP-pwd. Given a random EAP-pwd token an attacker can learn if all 10 iterations of the compute_password_element() function failed. This happens once every 2048 handshakes and in that case an error frame is sent to the client. This information could be abused by an attacker to brute force the password, as in the Dragonblood attack. This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:1672 https://access.redhat.com/errata/RHSA-2020:1672 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-13456 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:3984 https://access.redhat.com/errata/RHSA-2020:3984 |