Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2014-2015


Stack-based buffer overflow in the normify function in the rlm_pap module (modules/rlm_pap/rlm_pap.c) in FreeRADIUS 2.x, possibly 2.2.3 and earlier, and 3.x, possibly 3.0.1 and earlier, might allow attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password hash, as demonstrated by an SSHA hash.


Published

2014-11-02T00:55:03.313

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-119

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application freeradius freeradius 2.0 Yes
Application freeradius freeradius 2.0.1 Yes
Application freeradius freeradius 2.0.2 Yes
Application freeradius freeradius 2.0.3 Yes
Application freeradius freeradius 2.0.4 Yes
Application freeradius freeradius 2.0.5 Yes
Application freeradius freeradius 2.1.0 Yes
Application freeradius freeradius 2.1.1 Yes
Application freeradius freeradius 2.1.2 Yes
Application freeradius freeradius 2.1.3 Yes
Application freeradius freeradius 2.1.4 Yes
Application freeradius freeradius 2.1.6 Yes
Application freeradius freeradius 2.1.7 Yes
Application freeradius freeradius 2.1.8 Yes
Application freeradius freeradius 2.1.9 Yes
Application freeradius freeradius 2.1.10 Yes
Application freeradius freeradius 2.1.11 Yes
Application freeradius freeradius 2.1.12 Yes
Application freeradius freeradius 2.2.0 Yes
Application freeradius freeradius 2.2.1 Yes
Application freeradius freeradius 2.2.2 Yes
Application freeradius freeradius 2.2.3 Yes
Application freeradius freeradius 3.0.0 Yes
Application freeradius freeradius 3.0.1 Yes

References