Freeradius Pam Radius 1.4.0

CPE Details

Freeradius Pam Radius 1.4.0
1.4.0
2020-03-12
17h56 +00:00
2020-03-12
17h56 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:freeradius:pam_radius:1.4.0:*:*:*:*:*:*:*

Informations

Vendor

freeradius

Product

pam_radius

Version

1.4.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2015-9542 2020-02-24 13h14 +00:00 add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors.
7.5
High