First published: Wed Apr 03 2019(Updated: )
A vulnerability was found in FreeRadius. An invalid curve attack allows an attacker to authenticate as any user (without knowing the password). The problem is that on the reception of an EAP-PWD Commit frame, FreeRADIUS doesn't verify whether the received elliptic curve point is valid.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/freeradius | <3.0.19 | 3.0.19 |
debian/freeradius | 3.0.21+dfsg-2.2+deb11u1 3.2.1+dfsg-4+deb12u1 3.2.5+dfsg-3 | |
FreeRADIUS | <3.0.19 | |
Red Hat Fedora | ||
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux Server EUS | =7.6 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
Ubuntu | =19.04 | |
SUSE Linux | =15.0 |
https://github.com/FreeRADIUS/freeradius-server/commit/85497b5ff37ccb656895b826b88585898c209586
https://github.com/FreeRADIUS/freeradius-server/commit/ab4c767099f263a7cd4109bcdca80ee74210a769
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11235 has a high severity level due to its potential to allow an attacker to authenticate as any user.
To fix CVE-2019-11235, upgrade FreeRADIUS to version 3.0.21 or later.
CVE-2019-11235 affects FreeRADIUS versions prior to 3.0.21.
CVE-2019-11235 involves an invalid curve attack that exploits EAP-PWD Commit frame handling.
Yes, CVE-2019-11235 is exploitable remotely without requiring physical access to the server.