Description
add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2116-1 | libpam-radius-auth security update |
Debian DLA |
DLA-2304-1 | libpam-radius-auth security update |
EUVD |
EUVD-2015-9382 | add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors. |
Ubuntu USN |
USN-4290-1 | libpam-radius-auth vulnerability |
Ubuntu USN |
USN-4290-2 | libpam-radius-auth vulnerability |
References
History
Wed, 28 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Thu, 22 May 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T08:51:05.242Z
Reserved: 2020-02-11T00:00:00.000Z
Link: CVE-2015-9542
No data.
Status : Modified
Published: 2020-02-24T15:15:10.830
Modified: 2024-11-21T02:40:53.300
Link: CVE-2015-9542
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN