CVE-2015-9542
Summary
| CVE | CVE-2015-9542 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-02-24 15:15:00 UTC |
| Updated | 2020-08-14 14:28:00 UTC |
| Description | add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| [SECURITY] [DLA 2304-1] libpam-radius-auth security update |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| [SECURITY] [DLA 2116-1] libpam-radius-auth security update |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| 1686980 – (CVE-2015-9542) CVE-2015-9542 pam_radius: buffer overflow in password field |
CONFIRM |
bugzilla.redhat.com |
Issue Tracking, Patch, Third Party Advisory |
| Use "length", which has been limited in size · FreeRADIUS/pam_radius@01173ec · GitHub |
MISC |
github.com |
Patch, Third Party Advisory |
| USN-4290-2: libpam-radius-auth vulnerability | Ubuntu security notices | Ubuntu |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| USN-4290-1: libpam-radius-auth vulnerability | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 750128 SUSE Enterprise Linux Security Update for pam_radius (SUSE-SU-2021:1896-1)
- 750163 OpenSUSE Security Update for pam_radius (openSUSE-SU-2021:0870-1)
- 750765 OpenSUSE Security Update for pam_radius (openSUSE-SU-2021:1896-1)