FreeRADIUS before 3.0.19 mishandles the "each participant verifies that the received scalar is within a range, and that the received group element is a valid point on the curve being used" protection mechanism, aka a "Dragonblood" issue, a similar issue to CVE-2019-9498 and CVE-2019-9499.
[
{
"target": {
"function": "process_peer_commit",
"file": "src/modules/rlm_eap/types/rlm_eap_pwd/eap_pwd.c"
},
"signature_type": "Function",
"id": "CVE-2019-11235-1fd28794",
"deprecated": false,
"source": "https://github.com/freeradius/freeradius-server/commit/ab4c767099f263a7cd4109bcdca80ee74210a769",
"signature_version": "v1",
"digest": {
"function_hash": "129569143899151200956858467118537793085",
"length": 3217.0
}
},
{
"target": {
"file": "src/modules/rlm_eap/types/rlm_eap_pwd/eap_pwd.c"
},
"signature_type": "Line",
"id": "CVE-2019-11235-7d9d3913",
"deprecated": false,
"source": "https://github.com/freeradius/freeradius-server/commit/ab4c767099f263a7cd4109bcdca80ee74210a769",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"44628322362010892775297859780437640634",
"247023918149329515823030769271528430332",
"224033363932944218881098358854636411965",
"17630095911784018250606902112754836822",
"216632450278555283936186076618328015503",
"95929150371845356609814502021181772614",
"55929718924763167308877861755612329536",
"22676619042527158489947307178530195583"
]
}
}
]