CVE-2007-2028: vulnerable to memory exhaustion via malformed Diameter format attributes inside of an EAP-TTLS tunnel

Bug #106006 reported by Kees Cook
256
Affects Status Importance Assigned to Milestone
freeradius (Fedora)
Fix Released
Medium
freeradius (Ubuntu)
Fix Released
Undecided
Unassigned
Dapper
Fix Released
Undecided
William Grant
Edgy
Fix Released
Undecided
William Grant
Feisty
Fix Released
Undecided
William Grant

Bug Description

Binary package hint: freeradius

Security update from http://www.freeradius.org/security.html

"v1.1.5, and earlier - A malicous 802.1x supplicant could send malformed Diameter format attributes inside of an EAP-TTLS tunnel. The server would reject the authentication request, but would leak one VALUE_PAIR data structure, of approximately 300 bytes. If an attacker performed the attack many times (e.g. thousands or more over a period of minutes to hours), the server could leak megabytes of memory, potentially leading to an "out of memory" condition, and early process exit.

We recommend that administrators using EAP-TTLS upgrade immediately.
This bug was found as part of the Coverity Scan project."

Revision history for this message
In , Josh (josh-redhat-bugs) wrote :

A flaw was found in the way FreeRADIUS parses certain authentication requests.
The upstream description explain it as such:
http://www.freeradius.org/security.html

    2007.04.10 v1.1.5, and earlier - A malicous 802.1x supplicant could send
    malformed Diameter format attributes inside of an EAP-TTLS tunnel. The
    server would reject the authentication request, but would leak one
    VALUE_PAIR data structure, of approximately 300 bytes. If an attacker
    performed the attack many times (e.g. thousands or more over a period of
    minutes to hours), the server could leak megabytes of memory, potentially
    leading to an "out of memory" condition, and early process exit.

    We recommend that administrators using EAP-TTLS upgrade immediately.
    This bug was found as part of the Coverity Scan project.

The EAP-TTLS support is not enabled by default in any FreeRADIUS
installations.

This flaw also affects RHEL 3 and 4.

Revision history for this message
In , Josh (josh-redhat-bugs) wrote :

Created attachment 152488
Upstream Patch

Revision history for this message
Eddie M. (eddiemartinez) wrote :

This bug is a duplicate of bug # 106008

Revision history for this message
Kees Cook (kees) wrote :

Looks like you typo'd the duplication. 106008 isn't about freeradius. :)

Revision history for this message
In , Red (red-redhat-bugs) wrote :

An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2007-0338.html

William Grant (wgrant)
Changed in freeradius:
status: New → Fix Released
Revision history for this message
William Grant (wgrant) wrote :

I'll get to this within a couple of days - the patch is on the RHEL bug.

Changed in freeradius:
assignee: nobody → fujitsu
status: New → In Progress
assignee: nobody → fujitsu
status: New → In Progress
assignee: nobody → fujitsu
status: New → In Progress
Changed in freeradius:
status: Unknown → Fix Released
Kees Cook (kees)
Changed in freeradius:
status: In Progress → Triaged
status: In Progress → Triaged
status: In Progress → Triaged
William Grant (wgrant)
Changed in freeradius:
status: Triaged → In Progress
William Grant (wgrant)
Changed in freeradius:
status: Triaged → In Progress
status: Triaged → In Progress
Revision history for this message
William Grant (wgrant) wrote :
Revision history for this message
William Grant (wgrant) wrote :
Revision history for this message
William Grant (wgrant) wrote :
Revision history for this message
Kees Cook (kees) wrote :

Thanks for preparing this! I've uploaded it to the security queue; it should be published shortly.

Changed in freeradius:
status: In Progress → Fix Committed
status: In Progress → Fix Committed
status: In Progress → Fix Committed
Revision history for this message
William Grant (wgrant) wrote :

freeradius (1.1.3-3ubuntu1.1) feisty-security; urgency=low

  * SECURITY UPDATE: denial of service in EAP-TTLS module (LP: #106006).
  * debian/patches/04_CVE-2007-2028.dpatch: Properly free VALUE_PAIR
    structures on rejected authentication, to avoid memory leaks. Patch from
    Red Hat Bugzilla.
  * References
    CVE-2007-2028

 -- William Grant <email address hidden> Tue, 20 Nov 2007 20:10:45 +1100

Changed in freeradius:
status: Fix Committed → Fix Released
William Grant (wgrant)
Changed in freeradius:
status: Fix Committed → Fix Released
status: Fix Committed → Fix Released
Changed in freeradius (Fedora):
importance: Unknown → Medium
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.