{"id":"CVE-2017-10982","details":"An FR-GV-205 issue in FreeRADIUS 2.x before 2.2.10 allows \"DHCP - Buffer over-read in fr_dhcp_decode_options()\" and a denial of service.","modified":"2026-04-02T00:00:26.432502Z","published":"2017-07-17T17:29:00.307Z","related":["MGASA-2017-0232","SUSE-SU-2017:2244-1"],"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/99912"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3930"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1038914"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1759"},{"type":"FIX","url":"http://freeradius.org/security/fuzzer-2017.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/freeradius/freeradius-server","events":[{"introduced":"0"},{"last_affected":"74ef9b64f7cd631b13d7a61bd1588a2bfc75ba39"},{"introduced":"0"},{"last_affected":"64c447ee26d79773230ddf37631058128fe301fe"},{"introduced":"0"},{"last_affected":"a22023e192fb491903f1e492d74989b0a4324cb9"},{"introduced":"0"},{"last_affected":"dfb32dca4abfaf76ed59b81c6b333bcc91be0ee9"},{"introduced":"0"},{"last_affected":"db35d2eba513c9aa0fdf127b7e66c5c9bb036bc0"},{"introduced":"0"},{"last_affected":"7cd6369a90399dc8836242dde3ce8a3e9595cb42"},{"introduced":"0"},{"last_affected":"ae87fd0cf769498d5ae9a809cc2d703a7494561e"},{"introduced":"0"},{"last_affected":"edf2361c554fe2fe2a1b9a50e81369aaa44a74f9"},{"introduced":"0"},{"last_affected":"bacf36805f38d059f58c5c62141f91611e8a1bbc"},{"introduced":"0"},{"last_affected":"1c8d4d4cad8a07e96c0898fcf1cda8d2f3982495"},{"introduced":"0"},{"last_affected":"239ba3f92884be49adc90b1383aa8b54cb150fe9"},{"introduced":"0"},{"last_affected":"4c44a40e68c08b445123100b39855f36b65bf5f9"},{"introduced":"0"},{"last_affected":"a2c610854bef0f961573f15022d77b1088e8c819"},{"introduced":"0"},{"last_affected":"29ce823f72ffdfb2051765a6417126ee91e22552"},{"introduced":"0"},{"last_affected":"af07ace2815910610c0d39de90e4c0cf0735188d"},{"introduced":"0"},{"last_affected":"4d396a436e73b0331167907e2d84931645b72648"},{"introduced":"0"},{"last_affected":"7c4c5199e6631d1e93c06025a45e8ba967276986"},{"introduced":"0"},{"last_affected":"1d1e9b7372abecfc0942b127e5faf90df547e198"},{"introduced":"0"},{"last_affected":"34c68ba800632ccca564f6bdcb186e32886684c1"},{"introduced":"0"},{"last_affected":"70c228536c4a9113caf509fbfeab305ccfcd25c8"},{"introduced":"0"},{"last_affected":"393dd3c3a1a9582040c419c9be35fd4ce56d38cd"},{"introduced":"0"},{"last_affected":"b511525f17d3f40ba28d11d7797a827298df1333"},{"introduced":"0"},{"last_affected":"96c47460fad08af8822769d75636ab6d5253d3bf"},{"introduced":"0"},{"last_affected":"28e67574dc8011e86c462b7e8204e180a3667ac5"},{"introduced":"0"},{"last_affected":"127137c63569fbb61555df9f8f9c7364a0fa830d"},{"introduced":"0"},{"last_affected":"b75980dc5b8b38f562948492695b9d6151a2cb94"},{"introduced":"0"},{"last_affected":"bf3d29efb416335c1f3b6cc5b25ee06265f160a4"},{"introduced":"0"},{"last_affected":"298781855b0e0298a3992dacf20aa444b4f1344b"},{"introduced":"0"},{"last_affected":"1ab83f3abbc87236bbf24379b5413c16f752ee3b"},{"introduced":"0"},{"last_affected":"de6808e7e3b9cf970f6f8067f762d6a66a6bbaab"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.0.0"},{"introduced":"0"},{"last_affected":"2.0.0-pre1"},{"introduced":"0"},{"last_affected":"2.0.0-pre2"},{"introduced":"0"},{"last_affected":"2.0.1"},{"introduced":"0"},{"last_affected":"2.0.2"},{"introduced":"0"},{"last_affected":"2.0.3"},{"introduced":"0"},{"last_affected":"2.0.4"},{"introduced":"0"},{"last_affected":"2.0.5"},{"introduced":"0"},{"last_affected":"2.1.0"},{"introduced":"0"},{"last_affected":"2.1.1"},{"introduced":"0"},{"last_affected":"2.1.2"},{"introduced":"0"},{"last_affected":"2.1.3"},{"introduced":"0"},{"last_affected":"2.1.4"},{"introduced":"0"},{"last_affected":"2.1.6"},{"introduced":"0"},{"last_affected":"2.1.7"},{"introduced":"0"},{"last_affected":"2.1.8"},{"introduced":"0"},{"last_affected":"2.1.9"},{"introduced":"0"},{"last_affected":"2.1.10"},{"introduced":"0"},{"last_affected":"2.1.11"},{"introduced":"0"},{"last_affected":"2.1.12"},{"introduced":"0"},{"last_affected":"2.2.0"},{"introduced":"0"},{"last_affected":"2.2.1"},{"introduced":"0"},{"last_affected":"2.2.2"},{"introduced":"0"},{"last_affected":"2.2.3"},{"introduced":"0"},{"last_affected":"2.2.4"},{"introduced":"0"},{"last_affected":"2.2.5"},{"introduced":"0"},{"last_affected":"2.2.6"},{"introduced":"0"},{"last_affected":"2.2.7"},{"introduced":"0"},{"last_affected":"2.2.8"},{"introduced":"0"},{"last_affected":"2.2.9"}]}}],"versions":["first-build","release_0_1_0","release_0_2_0","release_0_3_0","release_0_4_0","release_0_5_0","release_0_6_0","release_0_7_0","release_0_7_1","release_0_8_1","release_0_9_0","release_0_9_0_final","release_0_9_0_pre2","release_0_9_0_pre3","release_0_9_1","release_0_9_2","release_0_9_3","release_1_0_0","release_1_0_0_pre1","release_1_0_0_pre2","release_1_0_0_pre3","release_1_0_1","release_1_0_2","release_1_0_3","release_1_0_4","release_1_0_5","release_1_1_0","release_1_1_0_pre0","release_1_1_1","release_1_1_2","release_1_1_3","release_1_1_4","release_1_1_5","release_1_1_6","release_2_0_0_pre1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-10982.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}