Public Date:
1468487: CVE-2017-10978 freeradius: Out-of-bounds read/write due to improper output buffer size check in make_secret()
An out-of-bounds read and write flaw was found in the way FreeRADIUS server handled RADIUS packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted RADIUS packet.

Find out more about CVE-2017-10978 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

CVSS3 Base Score 5.9
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector Network
Attack Complexity High
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality None
Integrity Impact None
Availability Impact High

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 6 (freeradius) RHSA-2017:1759 2017-07-18
Red Hat Enterprise Linux 7 (freeradius) RHSA-2017:2389 2017-08-01

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 5 freeradius2 Will not fix
Red Hat Enterprise Linux 5 freeradius Will not fix


Red Hat would like to thank the FreeRADIUS project for reporting this issue. Upstream acknowledges Guido Vranken as the original reporter.

External References

Last Modified