CVE-2019-11235Insufficient Verification of Data Authenticity in Freeradius

Severity
9.8CRITICALNVD
EPSS
3.4%
top 12.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 22
Latest updateMay 24

Description

FreeRADIUS before 3.0.19 mishandles the "each participant verifies that the received scalar is within a range, and that the received group element is a valid point on the curve being used" protection mechanism, aka a "Dragonblood" issue, a similar issue to CVE-2019-9498 and CVE-2019-9499.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages6 packages

NVDfreeradius/freeradius< 3.0.19
Debianfreeradius/freeradius< 3.0.17+dfsg-1.1+3
Ubuntufreeradius/freeradius< 3.0.16+dfsg-1ubuntu3.1
NVDopensuse/leap15.0

Also affects: Ubuntu Linux 18.04, 18.10, 19.04, Enterprise Linux 7.0, 7.6

Patches

🔴Vulnerability Details

4
GHSA
GHSA-qx2m-p74g-xjwh: FreeRADIUS before 32022-05-24
OSV
freeradius vulnerabilities2019-04-24
OSV
CVE-2019-11235: FreeRADIUS before 32019-04-22
CVEList
CVE-2019-11235: FreeRADIUS before 32019-04-21

📋Vendor Advisories

3
Ubuntu
FreeRADIUS vulnerabilities2019-04-24
Red Hat
freeradius: eap-pwd: authentication bypass via an invalid curve attack2019-04-10
Debian
CVE-2019-11235: freeradius - FreeRADIUS before 3.0.19 mishandles the "each participant verifies that the rece...2019

💬Community

2
Bugzilla
CVE-2019-11235 freeradius: eap-pwd: authentication bypass via an invalid curve attack [fedora-all]2019-04-12
Bugzilla
CVE-2019-11235 freeradius: eap-pwd: authentication bypass via an invalid curve attack2019-04-03
CVE-2019-11235 — Freeradius vulnerability | cvebase