Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-9542

Опубликовано: 24 фев. 2020
Источник: debian

Описание

add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libpam-radius-authfixed1.4.0-3package
libpam-radius-authfixed1.4.0-3~deb10u1busterpackage

Примечания

  • https://github.com/FreeRADIUS/pam_radius/commit/01173ec

  • https://github.com/FreeRADIUS/pam_radius/commit/6bae92d

  • https://github.com/FreeRADIUS/pam_radius/commit/ac2c1677

  • https://bugzilla.redhat.com/show_bug.cgi?id=1686980

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 6 лет назад

add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors.

CVSS3: 7.5
redhat
почти 6 лет назад

add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors.

CVSS3: 7.5
nvd
почти 6 лет назад

add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors.

suse-cvrf
больше 4 лет назад

Security update for pam_radius

suse-cvrf
больше 4 лет назад

Security update for pam_radius