CVE-2014-2015
02.11.2014, 00:55
Stack-based buffer overflow in the normify function in the rlm_pap module (modules/rlm_pap/rlm_pap.c) in FreeRADIUS 2.x, possibly 2.2.3 and earlier, and 3.x, possibly 3.0.1 and earlier, might allow attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password hash, as demonstrated by an SSHA hash.Enginsight
Vendor | Product | Version |
---|---|---|
freeradius | freeradius | 2.0 |
freeradius | freeradius | 2.0.1 |
freeradius | freeradius | 2.0.2 |
freeradius | freeradius | 2.0.3 |
freeradius | freeradius | 2.0.4 |
freeradius | freeradius | 2.0.5 |
freeradius | freeradius | 2.1.0 |
freeradius | freeradius | 2.1.1 |
freeradius | freeradius | 2.1.2 |
freeradius | freeradius | 2.1.3 |
freeradius | freeradius | 2.1.4 |
freeradius | freeradius | 2.1.6 |
freeradius | freeradius | 2.1.7 |
freeradius | freeradius | 2.1.8 |
freeradius | freeradius | 2.1.9 |
freeradius | freeradius | 2.1.10 |
freeradius | freeradius | 2.1.11 |
freeradius | freeradius | 2.1.12 |
freeradius | freeradius | 2.2.0 |
freeradius | freeradius | 2.2.1 |
freeradius | freeradius | 2.2.2 |
freeradius | freeradius | 2.2.3 |
freeradius | freeradius | 3.0.0 |
freeradius | freeradius | 3.0.1 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References