FreeRADIUS: Authentication bypass in EAP-MSCHAPv2 module — GLSA 200604-03

The EAP-MSCHAPv2 module of FreeRADIUS is affected by a validation issue which causes some authentication checks to be bypassed.

Affected packages

net-dialup/freeradius on all architectures
Affected versions < 1.1.1
Unaffected versions >= 1.1.1
< 1.0.0

Background

FreeRADIUS is an open source RADIUS authentication server implementation.

Description

FreeRADIUS suffers from insufficient input validation in the EAP-MSCHAPv2 state machine.

Impact

An attacker could cause the server to bypass authentication checks by manipulating the EAP-MSCHAPv2 client state machine.

Workaround

There is no known workaround at this time.

Resolution

All FreeRADIUS users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-dialup/freeradius-1.1.1"

References

Release date
April 04, 2006

Latest revision
April 04, 2006: 01

Severity
normal

Exploitable
remote

Bugzilla entries