~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to retired/CVE-2014-2015

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
PublicDateAtUSN: 2014-02-21
2
 
Candidate: CVE-2014-2015
3
 
PublicDate: 2014-11-01
4
 
References:
5
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2015
6
 
 http://lists.freebsd.org/pipermail/freebsd-bugbusters/2014-February/000610.html
7
 
 https://usn.ubuntu.com/usn/usn-2122-1
8
 
Description:
9
 
 Stack-based buffer overflow in the normify function in the rlm_pap module
10
 
 (modules/rlm_pap/rlm_pap.c) in FreeRADIUS 2.x, possibly 2.2.3 and earlier,
11
 
 and 3.x, possibly 3.0.1 and earlier, might allow attackers to cause a
12
 
 denial of service (crash) and possibly execute arbitrary code via a long
13
 
 password hash, as demonstrated by an SSHA hash.
14
 
Ubuntu-Description:
15
 
Notes:
16
 
Bugs:
17
 
Priority: medium
18
 
Discovered-by: Pierre Carrier
19
 
Assigned-to: mdeslaur
20
 
 
21
 
Tags_freeradius: fortify-source stack-protector
22
 
Patches_freeradius:
23
 
 upstream: https://github.com/FreeRADIUS/freeradius-server/commit/0d606cfc29a.patch (2.x)
24
 
upstream_freeradius: needed
25
 
lucid_freeradius: released (2.1.8+dfsg-1ubuntu1.1)
26
 
precise_freeradius: released (2.1.10+dfsg-3ubuntu0.12.04.2)
27
 
quantal_freeradius: released (2.1.12+dfsg-1.1ubuntu0.1)
28
 
saucy_freeradius: released (2.1.12+dfsg-1.2ubuntu5.1)
29
 
devel_freeradius: released (2.1.12+dfsg-1.2ubuntu8)