Stack-based buffer overflow in the normify function in the rlm_pap module (modules/rlm_pap/rlm_pap.c) in FreeRADIUS 2.x, possibly 2.2.3 and previous versions, and 3.x, possibly 3.0.1 and previous versions, might allow malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a long password hash, as demonstrated by an SSHA hash.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
freeradius freeradius 2.2.2 |
||
freeradius freeradius 2.2.1 |
||
freeradius freeradius 2.1.3 |
||
freeradius freeradius 2.1.2 |
||
freeradius freeradius 2.0.3 |
||
freeradius freeradius 2.0.2 |
||
freeradius freeradius 3.0.1 |
||
freeradius freeradius 2.2.3 |
||
freeradius freeradius 2.1.6 |
||
freeradius freeradius 2.1.4 |
||
freeradius freeradius 2.0.5 |
||
freeradius freeradius 2.0.4 |
||
freeradius freeradius 2.2.0 |
||
freeradius freeradius 2.1.9 |
||
freeradius freeradius 2.1.12 |
||
freeradius freeradius 2.1.11 |
||
freeradius freeradius 2.0.1 |
||
freeradius freeradius 2.0 |
||
freeradius freeradius 3.0.0 |
||
freeradius freeradius 2.1.8 |
||
freeradius freeradius 2.1.7 |
||
freeradius freeradius 2.1.10 |
||
freeradius freeradius 2.1.1 |
||
freeradius freeradius 2.1.0 |