Bug 236247 - CVE-2007-2028 Freeradius EAP-TTLS denial of service
CVE-2007-2028 Freeradius EAP-TTLS denial of service
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: freeradius (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Thomas Woerner
: Security
Depends On:
  Show dependency treegraph
Reported: 2007-04-12 13:31 EDT by Josh Bressers
Modified: 2007-11-30 17:07 EST (History)
1 user (show)

See Also:
Fixed In Version: RHSA-2007-0338
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2007-05-10 12:04:13 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)
Upstream Patch (1.54 KB, patch)
2007-04-12 13:31 EDT, Josh Bressers
no flags Details | Diff

  None (edit)
Description Josh Bressers 2007-04-12 13:31:12 EDT
A flaw was found in the way FreeRADIUS parses certain authentication requests.
The upstream description explain it as such:

    2007.04.10 v1.1.5, and earlier - A malicous 802.1x supplicant could send
    malformed Diameter format attributes inside of an EAP-TTLS tunnel. The
    server would reject the authentication request, but would leak one
    VALUE_PAIR data structure, of approximately 300 bytes. If an attacker
    performed the attack many times (e.g. thousands or more over a period of
    minutes to hours), the server could leak megabytes of memory, potentially
    leading to an "out of memory" condition, and early process exit.

    We recommend that administrators using EAP-TTLS upgrade immediately.
    This bug was found as part of the Coverity Scan project.

The EAP-TTLS support is not enabled by default in any FreeRADIUS

This flaw also affects RHEL 3 and 4.
Comment 1 Josh Bressers 2007-04-12 13:31:12 EDT
Created attachment 152488 [details]
Upstream Patch
Comment 11 Red Hat Bugzilla 2007-05-10 12:04:13 EDT
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.


Note You need to log in before you can comment on or make changes to this bug.