CVE-2022-41860
Published: 14 December 2022
In freeradius, when an EAP-SIM supplicant sends an unknown SIM option, the server will try to look that option up in the internal dictionaries. This lookup will fail, but the SIM code will not check for that failure. Instead, it will dereference a NULL pointer, and cause the server to crash.
Priority
Status
Package | Release | Status |
---|---|---|
freeradius
Launchpad, Ubuntu, Debian |
bionic |
Released
(3.0.16+dfsg-1ubuntu3.2)
|
focal |
Released
(3.0.20+dfsg-3ubuntu0.2)
|
|
jammy |
Not vulnerable
(3.0.26~dfsg~git20220223.1.00ed0241fa-0ubuntu3)
|
|
kinetic |
Not vulnerable
(3.2.0+dfsg-1)
|
|
trusty |
Ignored
(end of standard support)
|
|
upstream |
Needs triage
|
|
xenial |
Released
(2.2.8+dfsg-0.1ubuntu0.1+esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
Patches:
upstream: https://github.com/FreeRADIUS/freeradius-server/commit/f1cdbb33ec61c4a64a |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |