Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2017.0079 Security Advisory: FreeRADIUS Erroneous Session Resumption 1 June 2017 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: FreeRADIUS Operating System: UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Unauthorised Access -- Remote/Unauthenticated Resolution: Patch/Upgrade Member content until: Saturday, July 1 2017 OVERVIEW FreeRADIUS server is vulnerable to TLS resumption authentication bypass for versions prior to 3.0.14. [1] IMPACT The following information was provided by the developer: "... server could be convinced to permit TLS session resumption before the authentication finished." [1] "We believe that this issue affects all versions of FreeRADIUS which use EAP methods based on EAP-TLS" [1] MITIGATION The developer provided the following advice: "The short-term fix is to disable session resumption in the cache subsection of the eap module." [1] "versions 1.0.x, 1.1.x, 2.0.x, 2.1.x, and 2.2.x are old and unsupported. Patches for those versions will not be released..." [1] "prior to version 3, the session cache was disabled by default, and required administrator intervention to enable it. " [1] " v4.0.x branch is not vulnerable to this issue" [1] "A better fix was put into the server, and was released in version 3.0.14." [1][2] REFERENCES [1] FreeRADIUS Erroneous Session Resumption http://freeradius.org/security.html [2] FreeRADIUS Download http://freeradius.org/download.html AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWS9mwYx+lLeg9Ub1AQglhg//Qc6oY8IsAF/T9fYX9dYS8D0XY1tyLvLQ cF8838kTOar1fW2zPn44oioqIRafARG2rtJv2gHOWNKtKnMM92w0R6rw/Mk6AO/9 ekENfNvhMAYTRwwImcrv9v+UvglVNYVimmphSh6zpuHXTiR9/E1oyiNI4mBDxXN8 xLmpPR2LAezcIWD1CZY0hbhmeMqW29ibN3AaKNM0ZDLwWYBcDAske2T84ng0hfwj yQ9csHGZGYxb77xWVvsuObuOAzZyoTqCYC7lzY0vPMzqvgREV4WnUQ/IOby3mww+ /H/I+ZCWT6z7QDoeoaQ/+FCgFsGoJTxpQI/wAfSSyAFdhHT9A24jgjujCzvjHgAQ zBbr3dy/IFwWDXZa1kZ95K4WDsmX9QbqV1hn1XYaAMBDjb3yuv7p+RmVNY+a6nzR ibmyMZKfc8tVMDUCCaFrN8O7Su9iWaqyYF2tiIs82KsycwoXvwzBCbAnsrE50zTp aJdg1QONZdcpggmuHAQ8ua1XkZM/vnQ0+s+EdVS+yKqE+SaR7LBCNw74Xx/+yisp 3S0LmsCPGXMD4KD9codzN8Suun/WIqQnWYdDFzufqmeF/CDfzq4LgUhrcECQ26lb iJOBH2e1h2X4mLur5IZKG8R7EQ8usjoi8OjjxJi4QNjduocbZhKy+lwFhoLfhLWW 9T9bpt2Sois= =69cs -----END PGP SIGNATURE-----