FreeRADIUS: Denial of service A memory leak has been discovered in FreeRADIUS, possibly allowing for a Denial of Service. FreeRADIUS 2007-04-17 2007-04-17 174292 remote 1.1.6 1.1.6

FreeRADIUS is an open source RADIUS authentication server implementation.

The Coverity Scan project has discovered a memory leak within the handling of certain malformed Diameter format values inside an EAP-TTLS tunnel.

A remote attacker could send a large amount of specially crafted packets to a FreeRADIUS server using EAP-TTLS authentication and exhaust all memory, possibly resulting in a Denial of Service.

There is no known workaround at this time.

All FreeRADIUS users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=net-dialup/freeradius-1.1.6"
CVE-2007-2028 jaervosz p-y p-y