Количество 9
Количество 9
CVE-2015-9542
add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors.
CVE-2015-9542
add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors.
CVE-2015-9542
add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors.
CVE-2015-9542
add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correct ...
openSUSE-SU-2021:1896-1
Security update for pam_radius
openSUSE-SU-2021:0870-1
Security update for pam_radius
SUSE-SU-2021:1896-1
Security update for pam_radius
SUSE-SU-2020:1117-1
Security update for pam_radius
GHSA-x66h-w4xq-44q4
add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2015-9542 add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors. | CVSS3: 7.5 | 2% Низкий | почти 6 лет назад | |
CVE-2015-9542 add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors. | CVSS3: 7.5 | 2% Низкий | почти 6 лет назад | |
CVE-2015-9542 add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors. | CVSS3: 7.5 | 2% Низкий | почти 6 лет назад | |
CVE-2015-9542 add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correct ... | CVSS3: 7.5 | 2% Низкий | почти 6 лет назад | |
openSUSE-SU-2021:1896-1 Security update for pam_radius | 2% Низкий | больше 4 лет назад | ||
openSUSE-SU-2021:0870-1 Security update for pam_radius | 2% Низкий | больше 4 лет назад | ||
SUSE-SU-2021:1896-1 Security update for pam_radius | 2% Низкий | больше 4 лет назад | ||
SUSE-SU-2020:1117-1 Security update for pam_radius | 2% Низкий | почти 6 лет назад | ||
GHSA-x66h-w4xq-44q4 add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors. | CVSS3: 7.5 | 2% Низкий | больше 3 лет назад |
Уязвимостей на страницу