Bugzilla (bugzilla.redhat.com) will be under maintenance for infrastructure upgrades and will not be available on July 31st between 12:30 AM - 05:30 AM UTC. We appreciate your understanding and patience. You can follow status.redhat.com for details.
Bug 236247 - CVE-2007-2028 Freeradius EAP-TTLS denial of service
Summary: CVE-2007-2028 Freeradius EAP-TTLS denial of service
Alias: None
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: freeradius
Version: 5.0
Hardware: All
OS: Linux
Target Milestone: ---
: ---
Assignee: Thomas Woerner
QA Contact:
Whiteboard: impact=moderate,source=freeradius,pub...
Depends On:
TreeView+ depends on / blocked
Reported: 2007-04-12 17:31 UTC by Josh Bressers
Modified: 2007-11-30 22:07 UTC (History)
1 user (show)

Fixed In Version: RHSA-2007-0338
Doc Type: Bug Fix
Doc Text:
Clone Of:
Last Closed: 2007-05-10 16:04:13 UTC
Target Upstream Version:

Attachments (Terms of Use)
Upstream Patch (1.54 KB, patch)
2007-04-12 17:31 UTC, Josh Bressers
no flags Details | Diff

System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2007:0338 0 normal SHIPPED_LIVE Moderate: freeradius security update 2008-01-07 19:49:39 UTC

Description Josh Bressers 2007-04-12 17:31:12 UTC
A flaw was found in the way FreeRADIUS parses certain authentication requests.
The upstream description explain it as such:

    2007.04.10 v1.1.5, and earlier - A malicous 802.1x supplicant could send
    malformed Diameter format attributes inside of an EAP-TTLS tunnel. The
    server would reject the authentication request, but would leak one
    VALUE_PAIR data structure, of approximately 300 bytes. If an attacker
    performed the attack many times (e.g. thousands or more over a period of
    minutes to hours), the server could leak megabytes of memory, potentially
    leading to an "out of memory" condition, and early process exit.

    We recommend that administrators using EAP-TTLS upgrade immediately.
    This bug was found as part of the Coverity Scan project.

The EAP-TTLS support is not enabled by default in any FreeRADIUS

This flaw also affects RHEL 3 and 4.

Comment 1 Josh Bressers 2007-04-12 17:31:12 UTC
Created attachment 152488 [details]
Upstream Patch

Comment 11 Red Hat Bugzilla 2007-05-10 16:04:13 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.


Note You need to log in before you can comment on or make changes to this bug.