SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   FreeRADIUS Vendors:   FreeRADIUS Server Project
(Red Hat Issues Fix) FreeRADIUS 'Ascend-Send-Secret' Processing Error Lets Remote Users Crash the Service
SecurityTracker Alert ID:  1012229
SecurityTracker URL:  http://securitytracker.com/id/1012229
CVE Reference:   CVE-2004-0938, CVE-2004-0960, CVE-2004-0961   (Links to External Site)
Date:  Nov 14 2004
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.0.0
Description:   A vulnerability was reported in FreeRADIUS. A remote user can cause the target RADIUS service to crash.

The VulnDisco RADIUS test suite includes tests for a previously unreported denial of service vulnerability in FreeRADIUS 1.0.0.

The vendor reported that Ascend-Send-Secret, like Tunnel-Password, requires an "original" packet to decode the attribute [CVE: ]. The software checks for Tunnel-Password, but not Ascend-Send-Secret.

The flaw resides in 'radius.c' and 'eap_tls.c'.

The vendor also reported that a remote user can supply malformed USR vendor-specific attributes to invoke a memcpy() operation with a '-1' argument, causing the RADIUS service to crash [CVE: CVE-2004-0960].

The vendor also reported that a remote user can send a series of Access-Request packets with Ascend-Send-Secret, Ascend-Recv-Secret, or Tunnel-Password attributes to cause the service to consume all available memory [CVE: CVE-2004-0961].

Impact:   A remote user can cause the RADIUS service to crash.
Solution:   Red Hat has released a fix.

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/freeradius-1.0.1-1.RHEL3.src.rpm
621656bce9be62e733c090dd0bc81059 freeradius-1.0.1-1.RHEL3.src.rpm

i386:
d455913a52551fff9996afe88d80f938 freeradius-1.0.1-1.RHEL3.i386.rpm

ia64:
f7ee2516c9be633615450308ed855ac3 freeradius-1.0.1-1.RHEL3.ia64.rpm

ppc:
5acba566ecb5a125c39348d7d7055115 freeradius-1.0.1-1.RHEL3.ppc.rpm

s390:
9f5b97aeb4e992d5dcba4af94e2b1cc0 freeradius-1.0.1-1.RHEL3.s390.rpm

s390x:
48c5fded9dee50eba358a0656f424ba4 freeradius-1.0.1-1.RHEL3.s390x.rpm

x86_64:
c21c18f9eb81bf3c875f0f9ee7b11e64 freeradius-1.0.1-1.RHEL3.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/freeradius-1.0.1-1.RHEL3.src.rpm
621656bce9be62e733c090dd0bc81059 freeradius-1.0.1-1.RHEL3.src.rpm

i386:
d455913a52551fff9996afe88d80f938 freeradius-1.0.1-1.RHEL3.i386.rpm

ia64:
f7ee2516c9be633615450308ed855ac3 freeradius-1.0.1-1.RHEL3.ia64.rpm

x86_64:
c21c18f9eb81bf3c875f0f9ee7b11e64 freeradius-1.0.1-1.RHEL3.x86_64.rpm

Vendor URL:  www.freeradius.org/ (Links to External Site)
Cause:   Exception handling error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  3

Message History:   This archive entry is a follow-up to the message listed below.
Sep 20 2004 FreeRADIUS 'Ascend-Send-Secret' Processing Error Lets Remote Users Crash the Service



 Source Message Contents

Subject:  [RHSA-2004:609-01] Updated freeradius packages fix security flaws


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated freeradius packages fix security flaws
Advisory ID:       RHSA-2004:609-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2004-609.html
Issue date:        2004-11-12
Updated on:        2004-11-12
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2004-0938 CAN-2004-0960 CAN-2004-0961
- ---------------------------------------------------------------------

1. Summary:

Updated freeradius packages that fix a number of denial of service
vulnerabilities as well as minor bugs are now available for Red Hat
Enterprise Linux 3.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64

3. Problem description:

FreeRADIUS is a high-performance and highly configurable free RADIUS server
designed to allow centralized authentication and authorization for a network.

A number of flaws were found in FreeRADIUS versions prior to 1.0.1.  An
attacker who is able to send packets to the server could construct
carefully constructed packets in such a way as to cause the server to
consume memory or crash.  The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the names CAN-2004-0938, CAN-2004-0960, and
CAN-2004-0961 to these issues.

Users of FreeRADIUS should update to these erratum packages that contain
FreeRADIUS 1.0.1, which is not vulnerable to these issues and also corrects
a number of bugs.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info):

127168 - rebuilding freeradius picks up system libeap rather than package libeap
127162 - zlib-devel is missing from BuildRequires in spec file
130606 - Missing buildrequires in freediag
130613 - radiusd.conf specifies other pam-auth than file installed in /etc/pam.d
135825 - CAN-2004-0938 Freeradius < 1.0.1 DoS and remote crash (CAN-2004-0960, CAN-2004-0961)

6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/freeradius-1.0.1-1.RHEL3.src.rpm
621656bce9be62e733c090dd0bc81059  freeradius-1.0.1-1.RHEL3.src.rpm

i386:
d455913a52551fff9996afe88d80f938  freeradius-1.0.1-1.RHEL3.i386.rpm

ia64:
f7ee2516c9be633615450308ed855ac3  freeradius-1.0.1-1.RHEL3.ia64.rpm

ppc:
5acba566ecb5a125c39348d7d7055115  freeradius-1.0.1-1.RHEL3.ppc.rpm

s390:
9f5b97aeb4e992d5dcba4af94e2b1cc0  freeradius-1.0.1-1.RHEL3.s390.rpm

s390x:
48c5fded9dee50eba358a0656f424ba4  freeradius-1.0.1-1.RHEL3.s390x.rpm

x86_64:
c21c18f9eb81bf3c875f0f9ee7b11e64  freeradius-1.0.1-1.RHEL3.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/freeradius-1.0.1-1.RHEL3.src.rpm
621656bce9be62e733c090dd0bc81059  freeradius-1.0.1-1.RHEL3.src.rpm

i386:
d455913a52551fff9996afe88d80f938  freeradius-1.0.1-1.RHEL3.i386.rpm

ia64:
f7ee2516c9be633615450308ed855ac3  freeradius-1.0.1-1.RHEL3.ia64.rpm

x86_64:
c21c18f9eb81bf3c875f0f9ee7b11e64  freeradius-1.0.1-1.RHEL3.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key.html#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0938
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0960
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0961

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact.html

Copyright 2004 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFBlO0LXlSAg2UNWIIRAvWJAJ98QJSH+nBu0iJgrMescjXmsOXkVQCdEHFC
o3z0NqmIzLOmdA3VVULKMdE=
=zp1s
-----END PGP SIGNATURE-----


-- 
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC