The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "2.1.1"
},
{
"introduced": "0"
},
{
"last_affected": "2.1.2"
},
{
"introduced": "0"
},
{
"last_affected": "2.1.3"
},
{
"introduced": "0"
},
{
"last_affected": "2.1.4"
},
{
"introduced": "0"
},
{
"last_affected": "2.1.6"
},
{
"introduced": "0"
},
{
"last_affected": "2.1.7"
},
{
"introduced": "0"
},
{
"last_affected": "3.0.0"
},
{
"introduced": "0"
},
{
"last_affected": "3.0.1"
},
{
"introduced": "0"
},
{
"last_affected": "3.0.2"
},
{
"introduced": "0"
},
{
"last_affected": "3.0.3"
},
{
"introduced": "0"
},
{
"last_affected": "3.0.4"
},
{
"introduced": "0"
},
{
"last_affected": "3.0.5"
},
{
"introduced": "0"
},
{
"last_affected": "3.0.6"
},
{
"introduced": "0"
},
{
"last_affected": "3.0.7"
},
{
"introduced": "0"
},
{
"last_affected": "3.0.8"
},
{
"introduced": "0"
},
{
"last_affected": "3.0.9"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.0"
}
]
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-9148.json"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.1.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.1.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.1.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.1.3"
}
]
}
]