First published: Wed Apr 03 2019(Updated: )
A vulnerability was found in FreeRadius. An invalid curve attack allows an attacker to authenticate as any user (without knowing the password). The problem is that on the reception of an EAP-PWD Commit frame, FreeRADIUS doesn't verify whether the received elliptic curve point is valid.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Freeradius Freeradius | <3.0.19 | |
Fedoraproject Fedora | ||
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux Eus | =7.6 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
Canonical Ubuntu Linux | =19.04 | |
openSUSE Leap | =15.0 | |
redhat/freeradius | <3.0.19 | 3.0.19 |
debian/freeradius | 3.0.21+dfsg-2.2+deb11u1 3.2.1+dfsg-4+deb12u1 3.2.5+dfsg-3 |
https://github.com/FreeRADIUS/freeradius-server/commit/85497b5ff37ccb656895b826b88585898c209586
https://github.com/FreeRADIUS/freeradius-server/commit/ab4c767099f263a7cd4109bcdca80ee74210a769
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.