Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-8762

Опубликовано: 04 мая 2015
Источник: redhat
CVSS2: 2.9
EPSS Низкий

Описание

The EAP-PWD module in FreeRADIUS 3.0 through 3.0.8 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a zero-length EAP-PWD packet.

Отчет

This issue affects the version of freeradius as shipped with Red Hat Enterprise Linux 7. Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5freeradiusNot affected
Red Hat Enterprise Linux 6freeradiusNot affected
Red Hat Enterprise Linux 7freeradiusWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1218467freeradius: the EAP-PWD module performs insufficient validation on packets received from an EAP peer

EPSS

Процентиль: 65%
0.00495
Низкий

2.9 Low

CVSS2

Связанные уязвимости

CVSS3: 5.9
ubuntu
почти 9 лет назад

The EAP-PWD module in FreeRADIUS 3.0 through 3.0.8 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a zero-length EAP-PWD packet.

CVSS3: 5.9
nvd
почти 9 лет назад

The EAP-PWD module in FreeRADIUS 3.0 through 3.0.8 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a zero-length EAP-PWD packet.

CVSS3: 5.9
debian
почти 9 лет назад

The EAP-PWD module in FreeRADIUS 3.0 through 3.0.8 allows remote attac ...

CVSS3: 5.9
github
больше 3 лет назад

The EAP-PWD module in FreeRADIUS 3.0 through 3.0.8 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a zero-length EAP-PWD packet.

EPSS

Процентиль: 65%
0.00495
Низкий

2.9 Low

CVSS2