CVE-2015-9542

add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors.
Configurations

Configuration 1 (hide)

cpe:2.3:a:freeradius:pam_radius:1.4.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*

History

21 Nov 2024, 02:40

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-9542 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-9542 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/FreeRADIUS/pam_radius/commit/01173ec2426627dbb1e0d96c06c3ffa0b14d36d0 - Patch, Third Party Advisory () https://github.com/FreeRADIUS/pam_radius/commit/01173ec2426627dbb1e0d96c06c3ffa0b14d36d0 - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2020/02/msg00023.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2020/02/msg00023.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2020/08/msg00000.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2020/08/msg00000.html - Mailing List, Third Party Advisory
References () https://usn.ubuntu.com/4290-1/ - Third Party Advisory () https://usn.ubuntu.com/4290-1/ - Third Party Advisory
References () https://usn.ubuntu.com/4290-2/ - Third Party Advisory () https://usn.ubuntu.com/4290-2/ - Third Party Advisory

Information

Published : 2020-02-24 15:15

Updated : 2024-11-21 02:40


NVD link : CVE-2015-9542

Mitre link : CVE-2015-9542

CVE.ORG link : CVE-2015-9542


JSON object : View

Products Affected

debian

  • debian_linux

canonical

  • ubuntu_linux

freeradius

  • pam_radius
CWE
CWE-787

Out-of-bounds Write