Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-8764

Опубликовано: 04 мая 2015
Источник: redhat
CVSS2: 2.9

Описание

Off-by-one error in the EAP-PWD module in FreeRADIUS 3.0 through 3.0.8, which triggers a buffer overflow.

Отчет

This issue affects the version of freeradius as shipped with Red Hat Enterprise Linux 7. Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5freeradiusNot affected
Red Hat Enterprise Linux 6freeradiusNot affected
Red Hat Enterprise Linux 7freeradiusWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1218467freeradius: the EAP-PWD module performs insufficient validation on packets received from an EAP peer

2.9 Low

CVSS2

Связанные уязвимости

CVSS3: 8.1
ubuntu
почти 9 лет назад

Off-by-one error in the EAP-PWD module in FreeRADIUS 3.0 through 3.0.8, which triggers a buffer overflow.

CVSS3: 8.1
nvd
почти 9 лет назад

Off-by-one error in the EAP-PWD module in FreeRADIUS 3.0 through 3.0.8, which triggers a buffer overflow.

CVSS3: 8.1
debian
почти 9 лет назад

Off-by-one error in the EAP-PWD module in FreeRADIUS 3.0 through 3.0.8 ...

CVSS3: 8.1
github
больше 3 лет назад

Off-by-one error in the EAP-PWD module in FreeRADIUS 3.0 through 3.0.8, which triggers a buffer overflow.

2.9 Low

CVSS2