First published: Sun May 30 2010(Updated: )
It was reported [1],[2] that an error when processing requests queued for more than 30 seconds in src/main/event.c could be exploited to cause the process to crash by sending a large number of requests for an extended period of time. This flaw seems to only affect 2.1.x and was fixed [3] in 2.1.10. [1] <a href="https://bugs.freeradius.org/bugzilla/show_bug.cgi?id=35">https://bugs.freeradius.org/bugzilla/show_bug.cgi?id=35</a> [2] <a href="http://secunia.com/advisories/41621">http://secunia.com/advisories/41621</a> [3] <a href="http://github.com/alandekok/freeradius-server/commit/ff94dd35673bba1476594299d31ce8293b8bd223">http://github.com/alandekok/freeradius-server/commit/ff94dd35673bba1476594299d31ce8293b8bd223</a> The offending file (event.c), nor the affected function (wait_for_child_to_die()) are not present in the version of freeradius as provided with Red Hat Enterprise Linux 5 (1.1.3).
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
FreeRADIUS FreeRADIUS | =2.1.2 | |
FreeRADIUS FreeRADIUS | =2.1.1 | |
FreeRADIUS FreeRADIUS | =2.1.4 | |
FreeRADIUS FreeRADIUS | =2.1.7 | |
FreeRADIUS FreeRADIUS | =2.1.8 | |
FreeRADIUS FreeRADIUS | =2.1.9 | |
FreeRADIUS FreeRADIUS | =2.1.3 | |
FreeRADIUS FreeRADIUS | =2.1.0 | |
FreeRADIUS FreeRADIUS | =2.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3697 has been classified as medium severity due to its potential for denial-of-service attacks.
To fix CVE-2010-3697, upgrade FreeRADIUS to version 2.1.10 or later, where the vulnerability has been addressed.
CVE-2010-3697 affects FreeRADIUS versions 2.1.0 through 2.1.9.
CVE-2010-3697 enables a denial-of-service attack by allowing an attacker to crash the process through excessive requests.
CVE-2010-3697 is not specific to operating systems; it affects any system running the vulnerable versions of FreeRADIUS.