First published: Fri Oct 01 2010(Updated: )
It was reported [1],[2] that an error when processing DHCP requests with the 'Relay Agent Information' option (82) in src/lib/dhcp.c could be exploited to cause an infinite loop, in the process denying further requests via a packet with multiple sub-options. According to the upstream report, this flaw seems to only affect 2.1.9 and was fixed [3] in 2.1.10. [1] <a href="https://bugs.freeradius.org/bugzilla/show_bug.cgi?id=77">https://bugs.freeradius.org/bugzilla/show_bug.cgi?id=77</a> [2] <a href="http://secunia.com/advisories/41621">http://secunia.com/advisories/41621</a> [3] <a href="http://github.com/alandekok/freeradius-server/commit/4dc7800b866f889a1247685bbaa6dd4238a56279">http://github.com/alandekok/freeradius-server/commit/4dc7800b866f889a1247685bbaa6dd4238a56279</a> The offending file (dhcp.c) is not present in the version of freeradius as provided with Red Hat Enterprise Linux 5 (1.1.3).
Affected Software | Affected Version | How to fix |
---|---|---|
FreeRADIUS FreeRADIUS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-639390 has a high severity because it can be exploited to create an infinite loop, affecting the availability of the DHCP service.
To fix REDHAT-BUG-639390, users should update their FreeRADIUS server to the latest patched version that addresses this vulnerability.
The vulnerability REDHAT-BUG-639390 is caused by an error in processing DHCP requests with the 'Relay Agent Information' option, leading to an infinite loop.
The impact of REDHAT-BUG-639390 includes denial of service for further DHCP requests, potentially disrupting network connectivity.
Yes, REDHAT-BUG-639390 specifically affects FreeRADIUS servers that do not have the appropriate updates to mitigate this vulnerability.