Package: freeradius Severity: grave Tags: security Hi, the following vulnerability was published for freeradius.
CVE-2012-3547[0]: | PRE-CERT Security Advisory | ========================== | | * Advisory: PRE-SA-2012-06 | * Released on: 10 September 2012 | * Affected product: FreeRADIUS 2.1.10 - 2.1.12 | * Impact: remote code execution | * Origin: specially crafted client certificates | * CVSS Base Score: 10 | Impact Subscore: 10 | Exploitability Subscore: 10 | CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C) | * Credit: Timo Warns (PRESENSE Technologies GmbH) | * CVE Identifier: CVE-2012-3547 | | | Summary | - ------- | | A stack overflow vulnerability has been identified in FreeRADIUS that allows to | remotely execute arbitrary code via specially crafted client certificates | (before authentication). The vulnerability affects setups using TLS-based EAP | methods (including EAP-TLS, EAP-TTLS, and PEAP). | | FreeRADIUS defines a callback function cbtls_verify() for certificate | verification. The function has a local buf array with a size of 64 | bytes. It copies the validity timestamp "not after" of a client | certificate to the buf array: | | asn_time = X509_get_notAfter(client_cert); | if ((lookup <= 1) && asn_time && (asn_time->length < MAX_STRING_LEN)) { | memcpy(buf, (char*) asn_time->data, asn_time->length); | buf[asn_time->length] = '\0'; | | The MAX_STRING_LEN constant is defined to be 254. If asn_time->length is | greater than 64 bytes, but less than 254 bytes, buf overflows via the memcpy. | | Depending on the stack layout chosen by the compiler, the vulnerability allows | to overflow the return address on the stack, which can be exploited for code | execution. | | | Solution | - -------- | | The issue has been fixed in FreeRADIUS 2.2.0. Updates should be installed as | soon as possible. | | | References | - ---------- | | When further information becomes available, this advisory will be | updated. The most recent version of this advisory is available at: | | http://www.pre-cert.de/advisories/PRE-SA-2012-06.txt [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3547 http://security-tracker.debian.org/tracker/CVE-2012-3547 Cheers Nico
pgp37aqx17x1b.pgp
Description: PGP signature