Bug 236248 - CVE-2007-2028 Freeradius EAP-TTLS denial of service
Summary: CVE-2007-2028 Freeradius EAP-TTLS denial of service
Alias: None
Product: Fedora
Classification: Fedora
Component: freeradius (Show other bugs)
(Show other bugs)
Version: 6
Hardware: All Linux
Target Milestone: ---
Assignee: Thomas Woerner
QA Contact:
Whiteboard: impact=moderate,source=freeradius,pub...
Keywords: Security
Depends On:
TreeView+ depends on / blocked
Reported: 2007-04-12 17:41 UTC by Josh Bressers
Modified: 2007-11-30 22:12 UTC (History)
0 users

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2007-05-30 19:54:50 UTC
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

Description Josh Bressers 2007-04-12 17:41:00 UTC
+++ This bug was initially created as a clone of Bug #236247 +++

A flaw was found in the way FreeRADIUS parses certain authentication requests.
The upstream description explain it as such:

    2007.04.10 v1.1.5, and earlier - A malicous 802.1x supplicant could send
    malformed Diameter format attributes inside of an EAP-TTLS tunnel. The
    server would reject the authentication request, but would leak one
    VALUE_PAIR data structure, of approximately 300 bytes. If an attacker
    performed the attack many times (e.g. thousands or more over a period of
    minutes to hours), the server could leak megabytes of memory, potentially
    leading to an "out of memory" condition, and early process exit.

    We recommend that administrators using EAP-TTLS upgrade immediately.
    This bug was found as part of the Coverity Scan project.

The EAP-TTLS support is not enabled by default in any FreeRADIUS

This flaw also affects FC5

-- Additional comment from bressers@redhat.com on 2007-04-12 13:31 EST --
Created an attachment (id=152488)
Upstream Patch

Comment 1 Fedora Update System 2007-05-14 17:06:03 UTC
freeradius-1.1.3-2.fc6 has been pushed for fc6, which should resolve this issue.  If these problems are still present in this version, then please make note of it in this bug report.

Note You need to log in before you can comment on or make changes to this bug.