CVE-2015-9542

Priority
Description
add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly
check the length of the input password, and is vulnerable to a stack-based
buffer overflow during memcpy(). An attacker could send a crafted password
to an application (loading the pam_radius library) and crash it. Arbitrary
code execution might be possible, depending on the application, C library,
compiler, and other factors.
Assigned-to
mdeslaur
Notes
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):released (1.3.17-0ubuntu3.1)
Ubuntu 14.04 ESM (Trusty Tahr):released (1.3.17-0ubuntu4+esm1)
Ubuntu 16.04 LTS (Xenial Xerus):released (1.3.17-0ubuntu4.1)
Ubuntu 18.04 LTS (Bionic Beaver):released (1.3.17-0ubuntu5.18.04.1)
Ubuntu 19.10 (Eoan Ermine):released (1.3.17-0ubuntu5.19.10.1)
Ubuntu 20.04 (Focal Fossa):released (1.4.0-2ubuntu1)
Patches:
Upstream:https://github.com/FreeRADIUS/pam_radius/commit/01173ec
Upstream:https://github.com/FreeRADIUS/pam_radius/commit/6bae92d
Upstream:https://github.com/FreeRADIUS/pam_radius/commit/ac2c1677
More Information

Updated: 2020-03-18 22:42:50 UTC (commit 2ea7df7bd1e69e1e489978d2724a936eb3faa1b8)