1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
|
PublicDateAtUSN: 2014-02-21
Candidate: CVE-2014-2015
PublicDate: 2014-11-01
References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2015
http://lists.freebsd.org/pipermail/freebsd-bugbusters/2014-February/000610.html
http://www.ubuntu.com/usn/usn-2122-1
Description:
Stack-based buffer overflow in the normify function in the rlm_pap module
(modules/rlm_pap/rlm_pap.c) in FreeRADIUS 2.x, possibly 2.2.3 and earlier,
and 3.x, possibly 3.0.1 and earlier, might allow attackers to cause a
denial of service (crash) and possibly execute arbitrary code via a long
password hash, as demonstrated by an SSHA hash.
Ubuntu-Description:
Notes:
Bugs:
Priority: medium
Discovered-by: Pierre Carrier
Assigned-to: mdeslaur
Tags_freeradius: fortify-source stack-protector
Patches_freeradius:
upstream: https://github.com/FreeRADIUS/freeradius-server/commit/0d606cfc29a.patch (2.x)
upstream_freeradius: needed
lucid_freeradius: released (2.1.8+dfsg-1ubuntu1.1)
precise_freeradius: released (2.1.10+dfsg-3ubuntu0.12.04.2)
quantal_freeradius: released (2.1.12+dfsg-1.1ubuntu0.1)
saucy_freeradius: released (2.1.12+dfsg-1.2ubuntu5.1)
devel_freeradius: released (2.1.12+dfsg-1.2ubuntu8)
|