Description
The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-977-1 | freeradius security update |
EUVD |
EUVD-2017-18086 | The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS. |
Ubuntu USN |
USN-3316-1 | FreeRADIUS vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T16:55:22.379Z
Reserved: 2017-05-22T00:00:00.000Z
Link: CVE-2017-9148
No data.
Status : Deferred
Published: 2017-05-29T17:29:00.200
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-9148
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN