1
PublicDateAtUSN: 2014-02-21
2
Candidate: CVE-2014-2015
5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2015
6
http://lists.freebsd.org/pipermail/freebsd-bugbusters/2014-February/000610.html
7
https://usn.ubuntu.com/usn/usn-2122-1
9
Stack-based buffer overflow in the normify function in the rlm_pap module
10
(modules/rlm_pap/rlm_pap.c) in FreeRADIUS 2.x, possibly 2.2.3 and earlier,
11
and 3.x, possibly 3.0.1 and earlier, might allow attackers to cause a
12
denial of service (crash) and possibly execute arbitrary code via a long
13
password hash, as demonstrated by an SSHA hash.
18
Discovered-by: Pierre Carrier
21
Tags_freeradius: fortify-source stack-protector
23
upstream: https://github.com/FreeRADIUS/freeradius-server/commit/0d606cfc29a.patch (2.x)
24
upstream_freeradius: needed
25
lucid_freeradius: released (2.1.8+dfsg-1ubuntu1.1)
26
precise_freeradius: released (2.1.10+dfsg-3ubuntu0.12.04.2)
27
quantal_freeradius: released (2.1.12+dfsg-1.1ubuntu0.1)
28
saucy_freeradius: released (2.1.12+dfsg-1.2ubuntu5.1)
29
devel_freeradius: released (2.1.12+dfsg-1.2ubuntu8)