Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2014-2015

Published: 21 February 2014

Stack-based buffer overflow in the normify function in the rlm_pap module (modules/rlm_pap/rlm_pap.c) in FreeRADIUS 2.x, possibly 2.2.3 and earlier, and 3.x, possibly 3.0.1 and earlier, might allow attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password hash, as demonstrated by an SSHA hash.

Priority

Medium

Status

Package Release Status
freeradius
Launchpad, Ubuntu, Debian
upstream Needed

lucid
Released (2.1.8+dfsg-1ubuntu1.1)
precise
Released (2.1.10+dfsg-3ubuntu0.12.04.2)
quantal
Released (2.1.12+dfsg-1.1ubuntu0.1)
saucy
Released (2.1.12+dfsg-1.2ubuntu5.1)
Patches:
upstream: https://github.com/FreeRADIUS/freeradius-server/commit/0d606cfc29a.patch (2.x)
This vulnerability is mitigated in part by the use of -D_FORTIFY_SOURCE=2 in Ubuntu. This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu.