First published: Wed Feb 19 2014(Updated: )
Pierre Carrier reported a stack-based buffer overflow flaw in the FreeRADIUS rlm_pap module. An authenticated user could trigger this issue by creating a large password, causing FreeRADIUS to crash. The stack protector and SSP variable re-ordering protections should help prevent this issue from being used to execute arbitrary code. Upstream fixes: 2.x: <a href="https://github.com/FreeRADIUS/freeradius-server/commit/0d606cfc29a">https://github.com/FreeRADIUS/freeradius-server/commit/0d606cfc29a</a> 3.x: <a href="https://github.com/FreeRADIUS/freeradius-server/commit/ff5147c9e5088c7">https://github.com/FreeRADIUS/freeradius-server/commit/ff5147c9e5088c7</a> master: <a href="https://github.com/FreeRADIUS/freeradius-server/commit/f610864d4c8f51d">https://github.com/FreeRADIUS/freeradius-server/commit/f610864d4c8f51d</a> References: <a href="http://lists.freebsd.org/pipermail/freebsd-bugbusters/2014-February/000610.html">http://lists.freebsd.org/pipermail/freebsd-bugbusters/2014-February/000610.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
FreeRADIUS FreeRADIUS | >=2.x>=3.x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.