Stack-based buffer overflow in the normify function in the rlm_pap module (modules/rlm_pap/rlm_pap.c) in FreeRADIUS 2.x, possibly 2.2.3 and earlier, and 3.x, possibly 3.0.1 and earlier, might allow attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password hash, as demonstrated by an SSHA hash.
2014-11-02T00:55:03.313
2025-04-12T10:46:40.837
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | freeradius | freeradius | 2.0 | Yes |
| Application | freeradius | freeradius | 2.0.1 | Yes |
| Application | freeradius | freeradius | 2.0.2 | Yes |
| Application | freeradius | freeradius | 2.0.3 | Yes |
| Application | freeradius | freeradius | 2.0.4 | Yes |
| Application | freeradius | freeradius | 2.0.5 | Yes |
| Application | freeradius | freeradius | 2.1.0 | Yes |
| Application | freeradius | freeradius | 2.1.1 | Yes |
| Application | freeradius | freeradius | 2.1.2 | Yes |
| Application | freeradius | freeradius | 2.1.3 | Yes |
| Application | freeradius | freeradius | 2.1.4 | Yes |
| Application | freeradius | freeradius | 2.1.6 | Yes |
| Application | freeradius | freeradius | 2.1.7 | Yes |
| Application | freeradius | freeradius | 2.1.8 | Yes |
| Application | freeradius | freeradius | 2.1.9 | Yes |
| Application | freeradius | freeradius | 2.1.10 | Yes |
| Application | freeradius | freeradius | 2.1.11 | Yes |
| Application | freeradius | freeradius | 2.1.12 | Yes |
| Application | freeradius | freeradius | 2.2.0 | Yes |
| Application | freeradius | freeradius | 2.2.1 | Yes |
| Application | freeradius | freeradius | 2.2.2 | Yes |
| Application | freeradius | freeradius | 2.2.3 | Yes |
| Application | freeradius | freeradius | 3.0.0 | Yes |
| Application | freeradius | freeradius | 3.0.1 | Yes |