CVE-2017-10983

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

An FR-GV-206 issue in FreeRADIUS 2.x before 2.2.10 and 3.x before 3.0.15 allows "DHCP - Read overflow when decoding option 63" and a denial of service.

References

http://freeradius.org/security/fuzzer-2017.html

http://www.debian.org/security/2017/dsa-3930

http://www.securityfocus.com/bid/99915

http://www.securitytracker.com/id/1038914

https://access.redhat.com/errata/RHSA-2017:1759

https://access.redhat.com/errata/RHSA-2017:2389

Details

Source: MITRE

Published: 2017-07-17

Updated: 2018-01-05

Type: CWE-119

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:freeradius:freeradius:2.0.0:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.0.0:pre1:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.0.0:pre2:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.0.1:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.0.2:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.0.3:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.0.4:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.0.5:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.1.0:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.1.1:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.1.2:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.1.3:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.1.4:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.1.6:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.1.7:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.1.8:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.1.9:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.1.10:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.1.11:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.1.12:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.2.0:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.2.1:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.2.2:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.2.3:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.2.4:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.2.5:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.2.6:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.2.7:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.2.8:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:2.2.9:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:3.0.0:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:3.0.1:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:3.0.2:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:3.0.3:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:3.0.4:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:3.0.5:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:3.0.6:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:3.0.7:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:3.0.8:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:3.0.9:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:3.0.10:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:3.0.11:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:3.0.12:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:3.0.13:*:*:*:*:*:*:*

cpe:2.3:a:freeradius:freeradius:3.0.14:*:*:*:*:*:*:*

Tenable Plugins

View all (23 total)

IDNameProductFamilySeverity
127341NewStart CGSL MAIN 4.05 : freeradius Multiple Vulnerabilities (NS-SA-2019-0107)NessusNewStart CGSL Local Security Checks
critical
119219Virtuozzo 6 : freeradius / freeradius-krb5 / freeradius-ldap / etc (VZLSA-2017-1759)NessusVirtuozzo Local Security Checks
critical
104164openSUSE Security Update : freeradius-server (openSUSE-2017-1192)NessusSuSE Local Security Checks
critical
103006EulerOS 2.0 SP2 : freeradius (EulerOS-SA-2017-1168)NessusHuawei Local Security Checks
high
103005EulerOS 2.0 SP1 : freeradius (EulerOS-SA-2017-1167)NessusHuawei Local Security Checks
high
102810openSUSE Security Update : freeradius-server (openSUSE-2017-972)NessusSuSE Local Security Checks
critical
102784Debian DLA-1064-1 : freeradius security updateNessusDebian Local Security Checks
critical
102762CentOS 7 : freeradius (CESA-2017:2389)NessusCentOS Local Security Checks
critical
102729SUSE SLES11 Security Update : freeradius-server (SUSE-SU-2017:2244-1)NessusSuSE Local Security Checks
critical
102728SUSE SLES12 Security Update : freeradius-server (SUSE-SU-2017:2243-1)NessusSuSE Local Security Checks
critical
102661Scientific Linux Security Update : freeradius on SL7.x x86_64 (20170802)NessusScientific Linux Local Security Checks
critical
102579SUSE SLES12 Security Update : freeradius-server (SUSE-SU-2017:2202-1)NessusSuSE Local Security Checks
critical
102371Debian DSA-3930-1 : freeradius - security updateNessusDebian Local Security Checks
critical
102344Oracle Linux 7 : freeradius (ELSA-2017-2389)NessusOracle Linux Local Security Checks
critical
102180Amazon Linux AMI : freeradius (ALAS-2017-865)NessusAmazon Linux Local Security Checks
critical
102119RHEL 7 : freeradius (RHSA-2017:2389)NessusRed Hat Local Security Checks
critical
102033Ubuntu 14.04 LTS / 16.04 LTS / 17.04 : freeradius vulnerabilities (USN-3369-1)NessusUbuntu Local Security Checks
critical
102024Fedora 25 : freeradius (2017-24c64c531a)NessusFedora Local Security Checks
critical
102022Fedora 26 : freeradius (2017-0d726dbed3)NessusFedora Local Security Checks
critical
101823CentOS 6 : freeradius (CESA-2017:1759)NessusCentOS Local Security Checks
critical
101800Scientific Linux Security Update : freeradius on SL6.x i386/x86_64 (20170718)NessusScientific Linux Local Security Checks
critical
101798Oracle Linux 6 : freeradius (ELSA-2017-1759)NessusOracle Linux Local Security Checks
critical
101786RHEL 6 : freeradius (RHSA-2017:1759)NessusRed Hat Local Security Checks
critical