SSHA processing in freeradius before 2.2.3 runs into a stack-based buffer overflow in the freeradius rlm_pap module if the password source uses an unusually long hashed password (CVE-2014-2015).
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Mageia | 3 | noarch | freeradius | < 2.2.0-4.1 | freeradius-2.2.0-4.1.mga3 |
Mageia | 4 | noarch | freeradius | < 2.2.0-5.1 | freeradius-2.2.0-5.1.mga4 |