First published: Fri Apr 13 2007(Updated: )
Memory leak in freeRADIUS 1.1.5 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of EAP-TTLS tunnel connections using malformed Diameter format attributes, which causes the authentication request to be rejected but does not reclaim VALUE_PAIR data structures.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
FreeRADIUS FreeRADIUS | <=1.1.5 | |
FreeRADIUS | <=1.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2028 is considered a high severity vulnerability due to its potential to cause a denial of service through memory consumption.
To fix CVE-2007-2028, upgrade to FreeRADIUS version 1.1.6 or later where the memory leak has been addressed.
CVE-2007-2028 affects FreeRADIUS versions 1.1.5 and earlier.
CVE-2007-2028 allows remote attackers to launch denial of service attacks by exploiting the memory leak through malformed Diameter format attributes.
Although CVE-2007-2028 was reported in 2007, it remains relevant for any systems that have not been updated to a version newer than 1.1.5.