~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
PublicDateAtUSN: 2014-02-21
Candidate: CVE-2014-2015
PublicDate: 2014-11-01
References:
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2015
 http://lists.freebsd.org/pipermail/freebsd-bugbusters/2014-February/000610.html
 http://www.ubuntu.com/usn/usn-2122-1
Description:
 Stack-based buffer overflow in the normify function in the rlm_pap module
 (modules/rlm_pap/rlm_pap.c) in FreeRADIUS 2.x, possibly 2.2.3 and earlier,
 and 3.x, possibly 3.0.1 and earlier, might allow attackers to cause a
 denial of service (crash) and possibly execute arbitrary code via a long
 password hash, as demonstrated by an SSHA hash.
Ubuntu-Description:
Notes:
Bugs:
Priority: medium
Discovered-by: Pierre Carrier
Assigned-to: mdeslaur

Tags_freeradius: fortify-source stack-protector
Patches_freeradius:
 upstream: https://github.com/FreeRADIUS/freeradius-server/commit/0d606cfc29a.patch (2.x)
upstream_freeradius: needed
lucid_freeradius: released (2.1.8+dfsg-1ubuntu1.1)
precise_freeradius: released (2.1.10+dfsg-3ubuntu0.12.04.2)
quantal_freeradius: released (2.1.12+dfsg-1.1ubuntu0.1)
saucy_freeradius: released (2.1.12+dfsg-1.2ubuntu5.1)
devel_freeradius: released (2.1.12+dfsg-1.2ubuntu8)