Lucene search

K
mageiaGentoo FoundationMGASA-2014-0088
HistoryFeb 21, 2014 - 10:13 p.m.

Updated freeradius package fixes security vulnerability

2014-02-2122:13:26
Gentoo Foundation
advisories.mageia.org
26

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.008

Percentile

81.7%

SSHA processing in freeradius before 2.2.3 runs into a stack-based buffer overflow in the freeradius rlm_pap module if the password source uses an unusually long hashed password (CVE-2014-2015).

OSVersionArchitecturePackageVersionFilename
Mageia3noarchfreeradius< 2.2.0-4.1freeradius-2.2.0-4.1.mga3
Mageia4noarchfreeradius< 2.2.0-5.1freeradius-2.2.0-5.1.mga4

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.008

Percentile

81.7%