First published: Wed Feb 19 2014(Updated: )
Pierre Carrier reported a stack-based buffer overflow flaw in the FreeRADIUS rlm_pap module. An authenticated user could trigger this issue by creating a large password, causing FreeRADIUS to crash. The stack protector and SSP variable re-ordering protections should help prevent this issue from being used to execute arbitrary code. Upstream fixes: 2.x: <a href="https://github.com/FreeRADIUS/freeradius-server/commit/0d606cfc29a">https://github.com/FreeRADIUS/freeradius-server/commit/0d606cfc29a</a> 3.x: <a href="https://github.com/FreeRADIUS/freeradius-server/commit/ff5147c9e5088c7">https://github.com/FreeRADIUS/freeradius-server/commit/ff5147c9e5088c7</a> master: <a href="https://github.com/FreeRADIUS/freeradius-server/commit/f610864d4c8f51d">https://github.com/FreeRADIUS/freeradius-server/commit/f610864d4c8f51d</a> References: <a href="http://lists.freebsd.org/pipermail/freebsd-bugbusters/2014-February/000610.html">http://lists.freebsd.org/pipermail/freebsd-bugbusters/2014-February/000610.html</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeRADIUS FreeRADIUS | =2.0 | |
FreeRADIUS FreeRADIUS | =2.0.1 | |
FreeRADIUS FreeRADIUS | =2.0.2 | |
FreeRADIUS FreeRADIUS | =2.0.3 | |
FreeRADIUS FreeRADIUS | =2.0.4 | |
FreeRADIUS FreeRADIUS | =2.0.5 | |
FreeRADIUS FreeRADIUS | =2.1.0 | |
FreeRADIUS FreeRADIUS | =2.1.1 | |
FreeRADIUS FreeRADIUS | =2.1.2 | |
FreeRADIUS FreeRADIUS | =2.1.3 | |
FreeRADIUS FreeRADIUS | =2.1.4 | |
FreeRADIUS FreeRADIUS | =2.1.6 | |
FreeRADIUS FreeRADIUS | =2.1.7 | |
FreeRADIUS FreeRADIUS | =2.1.8 | |
FreeRADIUS FreeRADIUS | =2.1.9 | |
FreeRADIUS FreeRADIUS | =2.1.10 | |
FreeRADIUS FreeRADIUS | =2.1.11 | |
FreeRADIUS FreeRADIUS | =2.1.12 | |
FreeRADIUS FreeRADIUS | =2.2.0 | |
FreeRADIUS FreeRADIUS | =2.2.1 | |
FreeRADIUS FreeRADIUS | =2.2.2 | |
FreeRADIUS FreeRADIUS | =2.2.3 | |
FreeRADIUS FreeRADIUS | =3.0.0 | |
FreeRADIUS FreeRADIUS | =3.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2015 is classified as a medium severity vulnerability due to its potential impact on service availability.
To mitigate CVE-2014-2015, users should upgrade FreeRADIUS to a patched version above 2.0.5 or apply appropriate workarounds to limit password size.
CVE-2014-2015 affects FreeRADIUS versions from 2.0 to 3.0.1 that use the rlm_pap module.
CVE-2014-2015 can be exploited by an authenticated user who deliberately provides an oversized password to crash the FreeRADIUS server.
As of the last update, there have been no confirmed public exploits targeting CVE-2014-2015 in the wild.