FreeBSD : FreeRADIUS -- TLS resumption authentication bypass (673dce46-46d0-11e7-a539-0050569f7e80)

High Nessus Plugin ID 100581


The remote FreeBSD host is missing one or more security-related updates.


Stefan Winter reports :

The TLS session cache in FreeRADIUS before 3.0.14 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 100581

File Name: freebsd_pkg_673dce4646d011e7a5390050569f7e80.nasl

Version: $Revision: 3.3 $

Type: local

Published: 2017/06/02

Modified: 2018/02/01

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P


Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:freeradius, p-cpe:/a:freebsd:freebsd:freeradius2, p-cpe:/a:freebsd:freebsd:freeradius3, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2017/06/01

Vulnerability Publication Date: 2017/02/03

Reference Information

CVE: CVE-2017-9148