Summary
This host is running FreeRADIUS and is prone to Denial of Service vulnerability.
Impact
Successful exploitation will allow attacker to crash the service.
Impact Level: Application
Solution
Upgrade to version 1.1.8
http://freeradius.org/download.html
or
Apply patch from below link,
http://github.com/alandekok/freeradius-server/commit/860cad9e02ba344edb0038419e415fe05a9a01f4
*****
NOTE: Ignore this warning if above mentioned patch is already applied.
*****
Insight
The flaws are due to:
- An error in the 'rad_decode()' function in 'src/lib/radius.c' which can be exploited via zero-length Tunnel-Password attributes.
- An unspecified error that can be exploited to crash the 'radiusd' daemon.
Affected
FreeRADIUS version prior to 1.1.8
References
Severity
Classification
-
CVE CVE-2009-3111 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:N/A:P
Related Vulnerabilities
- Adobe Flash Media Server XML Data Remote Denial of Service Vulnerability
- Adobe Flash Media Server Remote Denial of Service Vulnerability (August-2011)
- ArGoSoft FTP Server XCWD Overflow
- ClamAV 'cli_pdf()' and 'cli_scanicon()' Denial of Service Vulnerabilities (Win
- Apache APR-Utils Multiple Denial of Service Vulnerabilities