7.5
CVSSv2

CVE-2014-2015

Published: 02/11/2014 Updated: 05/01/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in the normify function in the rlm_pap module (modules/rlm_pap/rlm_pap.c) in FreeRADIUS 2.x, possibly 2.2.3 and previous versions, and 3.x, possibly 3.0.1 and previous versions, might allow malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a long password hash, as demonstrated by an SSHA hash.

Vulnerable Product Search on Vulmon Subscribe to Product

freeradius freeradius 2.2.2

freeradius freeradius 2.2.1

freeradius freeradius 2.1.3

freeradius freeradius 2.1.2

freeradius freeradius 2.0.3

freeradius freeradius 2.0.2

freeradius freeradius 3.0.1

freeradius freeradius 2.2.3

freeradius freeradius 2.1.6

freeradius freeradius 2.1.4

freeradius freeradius 2.0.5

freeradius freeradius 2.0.4

freeradius freeradius 2.2.0

freeradius freeradius 2.1.9

freeradius freeradius 2.1.12

freeradius freeradius 2.1.11

freeradius freeradius 2.0.1

freeradius freeradius 2.0

freeradius freeradius 3.0.0

freeradius freeradius 2.1.8

freeradius freeradius 2.1.7

freeradius freeradius 2.1.10

freeradius freeradius 2.1.1

freeradius freeradius 2.1.0

Vendor Advisories

Several security issues were fixed in FreeRADIUS ...
Debian Bug report logs - #742820 freeradius: CVE-2014-2015 Package: src:freeradius; Maintainer for src:freeradius is Debian FreeRADIUS Packaging Team <pkg-freeradius-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 27 Mar 2014 19:15:01 UTC Severity: normal Tags: s ...
A stack-based buffer overflow was found in the way the FreeRADIUS rlm_pap module handled long password hashes An attacker able to make radiusd process a malformed password hash could cause the daemon to crash ...
A stack-based buffer overflow was found in the way the FreeRADIUS rlm_pap module handled long password hashes An attacker able to make radiusd process a malformed password hash could cause the daemon to crash ...