vulnerability

Oracle Linux: CVE-2017-9148: ELSA-2017-1581: freeradius security update (IMPORTANT)

Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
May 8, 2017
Added
Jun 29, 2017
Modified
Dec 3, 2025

Description

The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.
An authentication bypass flaw was found in the way the EAP module in FreeRADIUS handled TLS session resumption. A remote unauthenticated attacker could potentially use this flaw to bypass the inner authentication check in FreeRADIUS by resuming an older unauthenticated TLS session.

Solutions

oracle-linux-upgrade-freeradiusoracle-linux-upgrade-freeradius-develoracle-linux-upgrade-freeradius-docoracle-linux-upgrade-freeradius-krb5oracle-linux-upgrade-freeradius-ldaporacle-linux-upgrade-freeradius-mysqloracle-linux-upgrade-freeradius-perloracle-linux-upgrade-freeradius-postgresqloracle-linux-upgrade-freeradius-pythonoracle-linux-upgrade-freeradius-sqliteoracle-linux-upgrade-freeradius-unixodbcoracle-linux-upgrade-freeradius-utils
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.