Thread-topic: [SA19300] FreeRADIUS EAP-MSCHAPv2 Denial of Service Vulnerability
>
>
> TITLE:
> FreeRADIUS EAP-MSCHAPv2 Denial of Service Vulnerability
>
> SECUNIA ADVISORY ID:
> SA19300
>
> VERIFY ADVISORY:
> http://secunia.com/advisories/19300/
>
> CRITICAL:
> Less critical
>
> IMPACT:
> DoS
>
> WHERE:
> From local network
>
> SOFTWARE:
> FreeRADIUS 1.x
> http://secunia.com/product/3921/
>
> DESCRIPTION:
> A vulnerability has been reported in FreeRADIUS, which can be
> exploited by malicious people to cause a DoS (Denial of Service).
>
> The vulnerability is caused due to an input validation error in the
> EAP-MSCHAPv2 state machine. This can be exploited by manipulating the
> EAP-MSCHAPv2 state machine on a radius client to bypass server
> authentication checks and cause the server to crash.
>
> The vulnerability has been reported in version 1.0.0 through 1.1.0.
>
> SOLUTION:
> Update to version 1.1.1.
> http://www.freeradius.org/getting.html
>
> PROVIDED AND/OR DISCOVERED BY:
> The vendor credits Steffen Schuster.
>
> ORIGINAL ADVISORY:
> http://www.freeradius.org/security.html
>
> ----------------------------------------------------------------------
>