Lucene search

K
nvd[email protected]NVD:CVE-2014-2015
HistoryNov 02, 2014 - 12:55 a.m.

CVE-2014-2015

2014-11-0200:55:03
CWE-119
web.nvd.nist.gov

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.8 High

AI Score

Confidence

Low

0.008 Low

EPSS

Percentile

81.8%

Stack-based buffer overflow in the normify function in the rlm_pap module (modules/rlm_pap/rlm_pap.c) in FreeRADIUS 2.x, possibly 2.2.3 and earlier, and 3.x, possibly 3.0.1 and earlier, might allow attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password hash, as demonstrated by an SSHA hash.

Affected configurations

NVD
Node
freeradiusfreeradiusMatch2.0
OR
freeradiusfreeradiusMatch2.0.1
OR
freeradiusfreeradiusMatch2.0.2
OR
freeradiusfreeradiusMatch2.0.3
OR
freeradiusfreeradiusMatch2.0.4
OR
freeradiusfreeradiusMatch2.0.5
OR
freeradiusfreeradiusMatch2.1.0
OR
freeradiusfreeradiusMatch2.1.1
OR
freeradiusfreeradiusMatch2.1.2
OR
freeradiusfreeradiusMatch2.1.3
OR
freeradiusfreeradiusMatch2.1.4
OR
freeradiusfreeradiusMatch2.1.6
OR
freeradiusfreeradiusMatch2.1.7
OR
freeradiusfreeradiusMatch2.1.8
OR
freeradiusfreeradiusMatch2.1.9
OR
freeradiusfreeradiusMatch2.1.10
OR
freeradiusfreeradiusMatch2.1.11
OR
freeradiusfreeradiusMatch2.1.12
OR
freeradiusfreeradiusMatch2.2.0
OR
freeradiusfreeradiusMatch2.2.1
OR
freeradiusfreeradiusMatch2.2.2
OR
freeradiusfreeradiusMatch2.2.3
OR
freeradiusfreeradiusMatch3.0.0
OR
freeradiusfreeradiusMatch3.0.1

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.8 High

AI Score

Confidence

Low

0.008 Low

EPSS

Percentile

81.8%