Your submission was sent successfully! Close

CVE-2019-17185

Published: 21 March 2020

In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global OpenSSL BN_CTX instance to handle all handshakes. This mean multiple threads use the same BN_CTX instance concurrently, resulting in crashes when concurrent EAP-pwd handshakes are initiated. This can be abused by an adversary as a Denial-of-Service (DoS) attack.

Priority

Low

CVSS 3 base score: 7.5

Status

Package Release Status
freeradius
Launchpad, Ubuntu, Debian
Upstream
Released (3.0.20+dfsg-1)
Ubuntu 21.10 (Impish Indri) Not vulnerable
(3.0.20+dfsg-3build1)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(3.0.20+dfsg-3build1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(3.0.20+dfsg-3build1)
Ubuntu 18.04 LTS (Bionic Beaver) Needs triage

Ubuntu 16.04 ESM (Xenial Xerus) Needs triage

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist