FreeRADIUS before 3.0.19 mishandles the "each participant verifies that the received scalar is within a range, and that the received group element is a valid point on the curve being used" protection mechanism, aka a "Dragonblood" issue, a similar issue to CVE-2019-9498 and CVE-2019-9499.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
No history.
Information
Published : 2019-04-22 11:29
Updated : 2024-11-21 04:20
NVD link : CVE-2019-11235
Mitre link : CVE-2019-11235
CVE.ORG link : CVE-2019-11235
JSON object : View
Products Affected
redhat
- enterprise_linux_workstation
- enterprise_linux_server_aus
- enterprise_linux_eus
- enterprise_linux
- enterprise_linux_server
- enterprise_linux_server_tus
fedoraproject
- fedora
freeradius
- freeradius
opensuse
- leap
canonical
- ubuntu_linux
CWE
CWE-345
Insufficient Verification of Data Authenticity