FreeRADIUS Tunnel-Password Denial Of Service Vulnerability

Summary
This host is running FreeRADIUS and is prone to Denial of Service vulnerability.
Impact
Successful exploitation will allow attacker to crash the service. Impact Level: Application
Solution
Upgrade to version 1.1.8 http://freeradius.org/download.html or Apply patch from below link, http://github.com/alandekok/freeradius-server/commit/860cad9e02ba344edb0038419e415fe05a9a01f4 ***** NOTE: Ignore this warning if above mentioned patch is already applied. *****
Insight
The flaws are due to: - An error in the 'rad_decode()' function in 'src/lib/radius.c' which can be exploited via zero-length Tunnel-Password attributes. - An unspecified error that can be exploited to crash the 'radiusd' daemon.
Affected
FreeRADIUS version prior to 1.1.8
References