Memory leak in freeRADIUS 1.1.5 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of EAP-TTLS tunnel connections using malformed Diameter format attributes, which causes the authentication request to be rejected but does not reclaim VALUE_PAIR data structures.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Freeradius | Freeradius | * | 1.1.5 (including) |
Freeradius | Ubuntu | dapper | * |
Freeradius | Ubuntu | edgy | * |
Freeradius | Ubuntu | feisty | * |
Freeradius | Ubuntu | upstream | * |
Red Hat Enterprise Linux 3 | RedHat | freeradius-0:1.0.1-2.RHEL3.4 | * |
Red Hat Enterprise Linux 4 | RedHat | freeradius-0:1.0.1-3.RHEL4.5 | * |
Red Hat Enterprise Linux 5 | RedHat | freeradius-0:1.1.3-1.2.el5 | * |