Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-9542

Опубликовано: 24 фев. 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5
CVSS3: 7.5

Описание

add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors.

РелизСтатусПримечание
bionic

released

1.3.17-0ubuntu5.18.04.1
devel

released

1.4.0-2ubuntu1
eoan

released

1.3.17-0ubuntu5.19.10.1
esm-infra-legacy/trusty

released

1.3.17-0ubuntu4+esm1
esm-infra/bionic

released

1.3.17-0ubuntu5.18.04.1
esm-infra/xenial

released

1.3.17-0ubuntu4.1
precise/esm

not-affected

1.3.17-0ubuntu3.1
trusty

ignored

end of standard support
trusty/esm

released

1.3.17-0ubuntu4+esm1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 83%
0.019
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
почти 6 лет назад

add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors.

CVSS3: 7.5
nvd
почти 6 лет назад

add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors.

CVSS3: 7.5
debian
почти 6 лет назад

add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correct ...

suse-cvrf
больше 4 лет назад

Security update for pam_radius

suse-cvrf
больше 4 лет назад

Security update for pam_radius

EPSS

Процентиль: 83%
0.019
Низкий

5 Medium

CVSS2

7.5 High

CVSS3