diff options
author | rea <rea@FreeBSD.org> | 2012-09-11 16:46:31 +0800 |
---|---|---|
committer | rea <rea@FreeBSD.org> | 2012-09-11 16:46:31 +0800 |
commit | 0f42ed90a9c029b9e8fafb0aa8ac206c98d66b92 (patch) | |
tree | 6dc7038dea9a56631c9004be29b8bffbe9d05679 /security | |
parent | 1eee1e56f3306c58a833a19b14aec8f78d785c60 (diff) | |
download | freebsd-ports-gnome-0f42ed90a9c029b9e8fafb0aa8ac206c98d66b92.tar.gz freebsd-ports-gnome-0f42ed90a9c029b9e8fafb0aa8ac206c98d66b92.tar.zst freebsd-ports-gnome-0f42ed90a9c029b9e8fafb0aa8ac206c98d66b92.zip |
VuXML: document remote code execution in freeRADIUS
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 47 |
1 files changed, 47 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 85b8282d90d9..7c1e66cf8c17 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -51,6 +51,53 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="3bbbe3aa-fbeb-11e1-8bd8-0022156e8794"> + <topic>freeradius -- arbitrary code execution for TLS-based authentication</topic> + <affects> + <package> + <name>freeradius</name> + <range><ge>2.1.10</ge><lt>2.2.0</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>freeRADIUS security team reports:</p> + <blockquote cite="http://freeradius.org/security.html"> + <p>Overflow in EAP-TLS for 2.1.10, 2.1.11 and 2.1.12.</p> + <p>The issue was found by Timo Warns, and communicated to + security@freeradius.org. A sample exploit for the issue was + included in the notification.</p> + <p>The vulnerability was created in commit a368a6f4f4aaf on + August 18, 2010. Vulnerable versions include 2.1.10, 2.1.11, + and 2.1.12. Also anyone running the git "master" branch + after August 18, 2010 is vulnerable.</p> + <p>All sites using TLS-based EAP methods and the above + versions are vulnerable. The only configuration change which + can avoid the issue is to disable EAP-TLS, EAP-TTLS, and + PEAP.</p> + <p>An external attacker can use this vulnerability to + over-write the stack frame of the RADIUS server, and cause + it to crash. In addition, more sophisticated attacks may + gain additional privileges on the system running the RADIUS + server.</p> + <p>This attack does not require local network access to the + RADIUS server. It can be done by an attacker through a WiFi + Access Point, so long as the Access Point is configured to + use 802.1X authentication with the RADIUS server.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2012-3547</cvename> + <url>http://freeradius.org/security.html</url> + <url>http://www.pre-cert.de/advisories/PRE-SA-2012-06.txt</url> + </references> + <dates> + <discovery>2012-09-10</discovery> + <entry>2012-09-11</entry> + </dates> + </vuln> + <vuln vid="c1e5f35e-f93d-11e1-b07f-00235a5f2c9a"> <topic>emacs -- remote code execution vulnerability</topic> <affects> |