Bug 1468503 - (CVE-2017-10983) CVE-2017-10983 freeradius: Out-of-bounds read in fr_dhcp_decode() when decoding option 63
CVE-2017-10983 freeradius: Out-of-bounds read in fr_dhcp_decode() when decodi...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20170717,repor...
: Security
Depends On: 1469127 1469412 1469126 1469413 1471860
Blocks: 1468570
  Show dependency treegraph
 
Reported: 2017-07-07 05:17 EDT by Adam Mariš
Modified: 2017-08-02 05:47 EDT (History)
6 users (show)

See Also:
Fixed In Version: freeradius 2.2.10, freeradius 3.0.15
Doc Type: If docs needed, set a value
Doc Text:
An out-of-bounds read flaw was found in the way FreeRADIUS server handled decoding of DHCP packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted DHCP request.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-08-02 05:40:22 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
Proposed patch 1/2 (719 bytes, patch)
2017-07-07 08:11 EDT, Adam Mariš
no flags Details | Diff
Proposed patch 2/2 (995 bytes, patch)
2017-07-07 08:11 EDT, Adam Mariš
no flags Details | Diff

  None (edit)
Description Adam Mariš 2017-07-07 05:17:07 EDT
The fr_dhcp_decode() function performed a strcmp() on binary data in an internal data structure, instead of checking the length of the option and doing a memcmp. The server can read memory until it reaches a zero byte. Depending on memory layout, this read may initiate a page fault, and cause the server to crash.

The security impact is denial of service by any network device capable of sending DHCP packets to FreeRADIUS, which sends a DHCP option 63 with non-zero contents.

Affected versions: 2.0.0 through 3.0.14, inclusive.
Comment 1 Adam Mariš 2017-07-07 05:17:15 EDT
Acknowledgments:

Name: the FreeRADIUS project
Upstream: Guido Vranken
Comment 2 Adam Mariš 2017-07-07 08:11 EDT
Created attachment 1295275 [details]
Proposed patch 1/2
Comment 3 Adam Mariš 2017-07-07 08:11 EDT
Created attachment 1295276 [details]
Proposed patch 2/2
Comment 10 Dhiru Kholia 2017-07-17 10:35:52 EDT
Created freeradius tracking bugs for this issue:

Affects: fedora-all [bug 1471860]
Comment 11 errata-xmlrpc 2017-07-17 23:42:26 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2017:1759 https://access.redhat.com/errata/RHSA-2017:1759
Comment 12 errata-xmlrpc 2017-08-01 19:25:00 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:2389 https://access.redhat.com/errata/RHSA-2017:2389
Comment 13 Dhiru Kholia 2017-08-02 05:47:53 EDT
External References:

http://freeradius.org/security/fuzzer-2017.html

Note You need to log in before you can comment on or make changes to this bug.