Vulnerability Description
Memory leak in freeRADIUS 1.1.5 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of EAP-TTLS tunnel connections using malformed Diameter format attributes, which causes the authentication request to be rejected but does not reclaim VALUE_PAIR data structures.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freeradius | Freeradius | <= 1.1.5 |
References
- http://rhn.redhat.com/errata/RHSA-2007-0338.html
- http://secunia.com/advisories/24849
- http://secunia.com/advisories/24907
- http://secunia.com/advisories/24917
- http://secunia.com/advisories/24996
- http://secunia.com/advisories/25201
- http://secunia.com/advisories/25220
- http://security.gentoo.org/glsa/glsa-200704-14.xml
- http://www.freeradius.org/security.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:085
- http://www.novell.com/linux/security/advisories/2007_10_sr.html
- http://www.securityfocus.com/bid/23466
- http://www.securitytracker.com/id?1018042
- http://www.trustix.org/errata/2007/0013/
- http://www.vupen.com/english/advisories/2007/1369
FAQ
What is CVE-2007-2028?
CVE-2007-2028 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Memory leak in freeRADIUS 1.1.5 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of EAP-TTLS tunnel connections using malformed Diameter format ...
How severe is CVE-2007-2028?
CVE-2007-2028 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-2028?
Check the references section above for vendor advisories and patch information. Affected products include: Freeradius Freeradius.