Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-17185

Опубликовано: 14 нояб. 2019
Источник: redhat
CVSS3: 7.5

Описание

In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global OpenSSL BN_CTX instance to handle all handshakes. This mean multiple threads use the same BN_CTX instance concurrently, resulting in crashes when concurrent EAP-pwd handshakes are initiated. This can be abused by an adversary as a Denial-of-Service (DoS) attack.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5freeradiusNot affected
Red Hat Enterprise Linux 5freeradius2Not affected
Red Hat Enterprise Linux 6freeradiusNot affected
Red Hat Enterprise Linux 7freeradiusFixedRHSA-2020:398429.09.2020
Red Hat Enterprise Linux 8freeradiusFixedRHSA-2020:479904.11.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-567
https://bugzilla.redhat.com/show_bug.cgi?id=1816680freeradius: eap-pwd: DoS issues due to multithreaded BN_CTX access

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 5 лет назад

In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global OpenSSL BN_CTX instance to handle all handshakes. This mean multiple threads use the same BN_CTX instance concurrently, resulting in crashes when concurrent EAP-pwd handshakes are initiated. This can be abused by an adversary as a Denial-of-Service (DoS) attack.

CVSS3: 7.5
nvd
больше 5 лет назад

In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global OpenSSL BN_CTX instance to handle all handshakes. This mean multiple threads use the same BN_CTX instance concurrently, resulting in crashes when concurrent EAP-pwd handshakes are initiated. This can be abused by an adversary as a Denial-of-Service (DoS) attack.

CVSS3: 7.5
debian
больше 5 лет назад

In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global Op ...

rocky
около 5 лет назад

Moderate: freeradius:3.0 security and bug fix update

CVSS3: 7.5
github
больше 3 лет назад

In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global OpenSSL BN_CTX instance to handle all handshakes. This mean multiple threads use the same BN_CTX instance concurrently, resulting in crashes when concurrent EAP-pwd handshakes are initiated. This can be abused by an adversary as a Denial-of-Service (DoS) attack.

7.5 High

CVSS3