CVE-2019-11235

Publication date 16 April 2019

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

9.8 · Critical

Score breakdown

FreeRADIUS before 3.0.19 mishandles the "each participant verifies that the received scalar is within a range, and that the received group element is a valid point on the curve being used" protection mechanism, aka a "Dragonblood" issue, a similar issue to CVE-2019-9498 and CVE-2019-9499.

Status

Package Ubuntu Release Status
freeradius 19.04 disco
Fixed 3.0.17+dfsg-1ubuntu2.1
18.10 cosmic
Fixed 3.0.16+dfsg-3ubuntu1.1
18.04 LTS bionic
Fixed 3.0.16+dfsg-1ubuntu3.1
16.04 LTS xenial
Not affected
14.04 LTS trusty Not in release

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
freeradius

Severity score breakdown

Parameter Value
Base score 9.8 · Critical
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References

Related Ubuntu Security Notices (USN)

    • USN-3954-1
    • FreeRADIUS vulnerabilities
    • 24 April 2019

Other references