vulnerability
Red Hat: CVE-2019-17185: CVE-2019-17185 freeradius: eap-pwd: DoS issues due to multithreaded BN_CTX access (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | 2020-03-21 | 2020-10-01 | 2023-12-15 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
2020-03-21
Added
2020-10-01
Modified
2023-12-15
Description
In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global OpenSSL BN_CTX instance to handle all handshakes. This mean multiple threads use the same BN_CTX instance concurrently, resulting in crashes when concurrent EAP-pwd handshakes are initiated. This can be abused by an adversary as a Denial-of-Service (DoS) attack.
Solution(s)
redhat-upgrade-freeradiusredhat-upgrade-freeradius-debuginforedhat-upgrade-freeradius-debugsourceredhat-upgrade-freeradius-develredhat-upgrade-freeradius-docredhat-upgrade-freeradius-krb5redhat-upgrade-freeradius-krb5-debuginforedhat-upgrade-freeradius-ldapredhat-upgrade-freeradius-ldap-debuginforedhat-upgrade-freeradius-mysqlredhat-upgrade-freeradius-mysql-debuginforedhat-upgrade-freeradius-perlredhat-upgrade-freeradius-perl-debuginforedhat-upgrade-freeradius-postgresqlredhat-upgrade-freeradius-postgresql-debuginforedhat-upgrade-freeradius-pythonredhat-upgrade-freeradius-restredhat-upgrade-freeradius-rest-debuginforedhat-upgrade-freeradius-sqliteredhat-upgrade-freeradius-sqlite-debuginforedhat-upgrade-freeradius-unixodbcredhat-upgrade-freeradius-unixodbc-debuginforedhat-upgrade-freeradius-utilsredhat-upgrade-freeradius-utils-debuginforedhat-upgrade-python3-freeradiusredhat-upgrade-python3-freeradius-debuginfo

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.