First published: Fri Oct 01 2010(Updated: )
It was reported [1],[2] that an error when processing DHCP requests with the 'Relay Agent Information' option (82) in src/lib/dhcp.c could be exploited to cause an infinite loop, in the process denying further requests via a packet with multiple sub-options. According to the upstream report, this flaw seems to only affect 2.1.9 and was fixed [3] in 2.1.10. [1] <a href="https://bugs.freeradius.org/bugzilla/show_bug.cgi?id=77">https://bugs.freeradius.org/bugzilla/show_bug.cgi?id=77</a> [2] <a href="http://secunia.com/advisories/41621">http://secunia.com/advisories/41621</a> [3] <a href="http://github.com/alandekok/freeradius-server/commit/4dc7800b866f889a1247685bbaa6dd4238a56279">http://github.com/alandekok/freeradius-server/commit/4dc7800b866f889a1247685bbaa6dd4238a56279</a> The offending file (dhcp.c) is not present in the version of freeradius as provided with Red Hat Enterprise Linux 5 (1.1.3).
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
FreeRADIUS FreeRADIUS | =2.1.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.