Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-8763

Опубликовано: 04 мая 2015
Источник: redhat
CVSS2: 2.9
EPSS Низкий

Описание

The EAP-PWD module in FreeRADIUS 3.0 through 3.0.8 allows remote attackers to have unspecified impact via a crafted (1) commit or (2) confirm message, which triggers an out-of-bounds read.

Отчет

This issue affects the version of freeradius as shipped with Red Hat Enterprise Linux 7. Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5freeradiusNot affected
Red Hat Enterprise Linux 6freeradiusNot affected
Red Hat Enterprise Linux 7freeradiusWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1218467freeradius: the EAP-PWD module performs insufficient validation on packets received from an EAP peer

EPSS

Процентиль: 67%
0.0055
Низкий

2.9 Low

CVSS2

Связанные уязвимости

CVSS3: 8.1
ubuntu
почти 9 лет назад

The EAP-PWD module in FreeRADIUS 3.0 through 3.0.8 allows remote attackers to have unspecified impact via a crafted (1) commit or (2) confirm message, which triggers an out-of-bounds read.

CVSS3: 8.1
nvd
почти 9 лет назад

The EAP-PWD module in FreeRADIUS 3.0 through 3.0.8 allows remote attackers to have unspecified impact via a crafted (1) commit or (2) confirm message, which triggers an out-of-bounds read.

CVSS3: 8.1
debian
почти 9 лет назад

The EAP-PWD module in FreeRADIUS 3.0 through 3.0.8 allows remote attac ...

CVSS3: 8.1
github
больше 3 лет назад

The EAP-PWD module in FreeRADIUS 3.0 through 3.0.8 allows remote attackers to have unspecified impact via a crafted (1) commit or (2) confirm message, which triggers an out-of-bounds read.

EPSS

Процентиль: 67%
0.0055
Низкий

2.9 Low

CVSS2