Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1218467 - (CVE-2015-8762, CVE-2015-8763, CVE-2015-8764) CVE-2015-8762 CVE-2015-8763 CVE-2015-8764 freeradius: the EAP-PWD module performs insufficient validation on packets received from an EAP peer
CVE-2015-8762 CVE-2015-8763 CVE-2015-8764 freeradius: the EAP-PWD module perf...
Status: CLOSED WONTFIX
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20150504,repor...
: Security
Depends On: 1248894
Blocks: 1218471
  Show dependency treegraph
 
Reported: 2015-05-04 21:41 EDT by Fabio Olive Leite
Modified: 2016-11-08 10:55 EST (History)
6 users (show)

See Also:
Fixed In Version: FreeRADIUS 3.0.9
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-08-01 23:30:12 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Fabio Olive Leite 2015-05-04 21:41:53 EDT
The FreeRADIUS project has reported a flaw that affects the EAP-PWD module
of the freeradius package versions 3.0 up to 3.0.8. This module is not
enabled by default, so administrators must have manually enabled it for
their servers to be vulnerable.

External References:

http://freeradius.org/security.html#eap-pwd-2015
Comment 1 Huzaifa S. Sidhpurwala 2015-07-31 02:28:13 EDT
CVE Request:

http://seclists.org/oss-sec/2015/q3/261
Comment 2 Huzaifa S. Sidhpurwala 2015-07-31 02:30:33 EDT
Statement:

This issue affects the version of freeradius as shipped with Red Hat Enterprise Linux 7. Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates.
Comment 3 Huzaifa S. Sidhpurwala 2015-07-31 02:32:55 EDT
Created freeradius tracking bugs for this issue:

Affects: fedora-all [bug 1248894]
Comment 5 Adam Mariš 2016-01-11 08:31:28 EST
Three CVEs were assigned (http://seclists.org/oss-sec/2016/q1/52):

CVE-2015-8762: The EAP-PWD packet length is not checked before the first byte is
dereferenced. A zero-length EAP-PWD packet will cause the module to
dereference a NULL pointer, and will cause the server to crash.

CVE-2015-8763: The commit message payload length is not validated before the packet is decoded. This can result in a read overflow in the server. The confirm message payload length is not validated before the packet is decoded. This can result in a read overflow in the server.

CVE-2015-8764: A strcpy() was used to pack a C string into an EAP-PWD packet. This would result in an over-run of the destination buffer by one byte.

Note You need to log in before you can comment on or make changes to this bug.