Vulnerability Name:

CVE-2007-2028 (CCN-33643)

Assigned:2007-04-12
Published:2007-04-12
Updated:2017-10-11
Summary:Memory leak in freeRADIUS 1.1.5 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of EAP-TTLS tunnel connections using malformed Diameter format attributes, which causes the authentication request to be rejected but does not reclaim VALUE_PAIR data structures.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2007-2028

Source: CCN
Type: RHSA-2007-0338
Moderate: freeradius security update

Source: REDHAT
Type: UNKNOWN
RHSA-2007:0338

Source: CCN
Type: SA24849
FreeRADIUS EAP-TTLS "VALUE_PAIR" Memory Leak Security Issue

Source: SECUNIA
Type: UNKNOWN
24849

Source: SECUNIA
Type: UNKNOWN
24907

Source: SECUNIA
Type: UNKNOWN
24917

Source: SECUNIA
Type: UNKNOWN
24996

Source: SECUNIA
Type: UNKNOWN
25201

Source: SECUNIA
Type: UNKNOWN
25220

Source: GENTOO
Type: UNKNOWN
GLSA-200704-14

Source: CCN
Type: SECTRACK ID: 1018042
FreeRADIUS EAP-TTLS Memory Leak Lets Remote Users Deny Service

Source: CCN
Type: ASA-2007-203
FreeRADIUS security update (RHSA-2007-0338)

Source: CONFIRM
Type: UNKNOWN
http://www.freeradius.org/security.html

Source: CCN
Type: FreeRADIUS Web site
FreeRADIUS -- Security Contacts and notifications

Source: CCN
Type: GLSA-200704-14
FreeRADIUS: Denial of Service

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2007:085

Source: SUSE
Type: UNKNOWN
SUSE-SR:2007:010

Source: BID
Type: UNKNOWN
23466

Source: CCN
Type: BID-23466
FreeRadius EAP-TTLS Tunnel Memory Leak Remote Denial Of Service Vulnerability

Source: SECTRACK
Type: UNKNOWN
1018042

Source: TRUSTIX
Type: UNKNOWN
2007-0013

Source: VUPEN
Type: UNKNOWN
ADV-2007-1369

Source: XF
Type: UNKNOWN
freeradius-eapttls-dos(33643)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:11156

Source: SUSE
Type: SUSE-SR:2007:010
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:freeradius:freeradius:*:*:*:*:*:*:*:* (Version <= 1.1.5)

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:freeradius:freeradius:1.1.5:*:*:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:server:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1::x86-64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.5.z::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.5.z::es:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20072028
    V
    CVE-2007-2028
    2015-11-16
    oval:org.mitre.oval:def:22329
    P
    ELSA-2007:0338: freeradius security update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:11156
    V
    Memory leak in freeRADIUS 1.1.5 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of EAP-TTLS tunnel connections using malformed Diameter format attributes, which causes the authentication request to be rejected but does not reclaim VALUE_PAIR data structures.
    2013-04-29
    oval:com.redhat.rhsa:def:20070338
    P
    RHSA-2007:0338: freeradius security update (Moderate)
    2007-05-10
    BACK
    freeradius freeradius *
    freeradius freeradius 1.1.5
    gentoo linux *
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 4
    redhat enterprise linux 4
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    redhat enterprise linux 5
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2007.1
    mandrakesoft mandrake linux 2008.0
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2007.1
    redhat enterprise linux 4.5.z
    redhat enterprise linux 4.5.z