RHEL 3 : freeradius (RHSA-2003:386)

medium Nessus Plugin ID 12437

Synopsis

The remote Red Hat host is missing a security update.

Description

Updated FreeRADIUS packages are now available that fix a denial of service vulnerability.

FreeRADIUS is an Internet authentication daemon, which implements the RADIUS protocol. It allows Network Access Servers (NAS boxes) to perform authentication for dial-up users.

The rad_decode function in FreeRADIUS 0.9.2 and earlier allows remote attackers to cause a denial of service (crash) via a short RADIUS string attribute with a tag, which causes memcpy to be called with a
-1 length argument, as demonstrated using the Tunnel-Password attribute. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2003-0967 to this issue.

Users of FreeRADIUS are advised to upgrade to these erratum packages containing FreeRADIUS 0.9.3 which is not vulnerable to these issues.

Solution

Update the affected freeradius package.

See Also

https://access.redhat.com/security/cve/cve-2003-0967

https://marc.info/?l=freeradius-users&m=106947389449613

https://access.redhat.com/errata/RHSA-2003:386

Plugin Details

Severity: Medium

ID: 12437

File Name: redhat-RHSA-2003-386.nasl

Version: 1.28

Type: local

Agent: unix

Published: 7/6/2004

Updated: 1/14/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:freeradius, cpe:/o:redhat:enterprise_linux:3

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 1/16/2004

Vulnerability Publication Date: 12/15/2003

Reference Information

CVE: CVE-2003-0967

RHSA: 2003:386