FreeRADIUS before 3.0.19 mishandles the "each participant verifies that the received scalar is within a range, and that the received group element is a valid point on the curve being used" protection mechanism, aka a "Dragonblood" issue, a similar issue to CVE-2019-9498 and CVE-2019-9499.
References
Link | Resource |
---|---|
https://www.kb.cert.org/vuls/id/871675/ | Not Applicable US Government Resource Third Party Advisory |
https://papers.mathyvanhoef.com/dragonblood.pdf | Technical Description Third Party Advisory |
https://freeradius.org/security/ | Vendor Advisory |
https://freeradius.org/release_notes/?br=3.0.x&re=3.0.19 | Release Notes Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1695748 | Issue Tracking Patch Third Party Advisory |
https://usn.ubuntu.com/3954-1/ | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00014.html | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:1131 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:1142 | |
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00032.html | |
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00033.html |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Information
Published : 2019-04-22 04:29
Updated : 2019-05-13 11:29
NVD link : CVE-2019-11235
Mitre link : CVE-2019-11235
JSON object : View
CWE
CWE-345
Insufficient Verification of Data Authenticity
Products Affected
redhat
- enterprise_linux_server_aus
- enterprise_linux_workstation
- enterprise_linux
- enterprise_linux_server_tus
- enterprise_linux_server
- enterprise_linux_eus
fedoraproject
- fedora
canonical
- ubuntu_linux
freeradius
- freeradius
opensuse
- leap