CVE-2015-9542

Published: 31 December 2015

add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors.

Priority

Medium

CVSS 3 base score: 7.5

Status

Package Release Status
libpam-radius-auth
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 20.04 LTS (Focal Fossa)
Released (1.4.0-2ubuntu1)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (1.3.17-0ubuntu5.18.04.1)
Ubuntu 16.04 LTS (Xenial Xerus)
Released (1.3.17-0ubuntu4.1)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (1.3.17-0ubuntu4+esm1)
Ubuntu 12.04 ESM (Precise Pangolin)
Released (1.3.17-0ubuntu3.1)
Patches:
Upstream: https://github.com/FreeRADIUS/pam_radius/commit/01173ec
Upstream: https://github.com/FreeRADIUS/pam_radius/commit/6bae92d
Upstream: https://github.com/FreeRADIUS/pam_radius/commit/ac2c1677