ALT-PU-2016-1003-2
Package freeradius updated to version 2.2.9-alt1 for branch sisyphus in task 155642.
Closed vulnerabilities
Published: 2014-11-02
Modified: 2025-04-12
Modified: 2025-04-12
CVE-2014-2015
Stack-based buffer overflow in the normify function in the rlm_pap module (modules/rlm_pap/rlm_pap.c) in FreeRADIUS 2.x, possibly 2.2.3 and earlier, and 3.x, possibly 3.0.1 and earlier, might allow attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password hash, as demonstrated by an SSHA hash.
Severity: HIGH (7.5)Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
References:
- http://lists.freebsd.org/pipermail/freebsd-bugbusters/2014-February/000610.html
- http://lists.freebsd.org/pipermail/freebsd-bugbusters/2014-February/000612.html
- http://lists.freebsd.org/pipermail/freebsd-bugbusters/2014-February/000616.html
- http://rhn.redhat.com/errata/RHSA-2015-1287.html
- http://ubuntu.com/usn/usn-2122-1
- http://www.openwall.com/lists/oss-security/2014/02/18/3
- http://www.securityfocus.com/bid/65581
- https://bugzilla.redhat.com/show_bug.cgi?id=1066761
- http://lists.freebsd.org/pipermail/freebsd-bugbusters/2014-February/000610.html
- http://lists.freebsd.org/pipermail/freebsd-bugbusters/2014-February/000612.html
- http://lists.freebsd.org/pipermail/freebsd-bugbusters/2014-February/000616.html
- http://rhn.redhat.com/errata/RHSA-2015-1287.html
- http://ubuntu.com/usn/usn-2122-1
- http://www.openwall.com/lists/oss-security/2014/02/18/3
- http://www.securityfocus.com/bid/65581
- https://bugzilla.redhat.com/show_bug.cgi?id=1066761
Published: 2017-04-05
Modified: 2025-04-20
Modified: 2025-04-20
CVE-2015-4680
FreeRADIUS 2.2.x before 2.2.8 and 3.0.x before 3.0.9 does not properly check revocation of intermediate CA certificates.
Severity: MEDIUM (5.0)Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Severity: HIGH (7.5)Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
References:
- http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00010.html
- http://packetstormsecurity.com/files/132415/FreeRADIUS-Insufficient-CRL-Application.html
- http://www.ocert.org/advisories/ocert-2015-008.html
- http://www.securityfocus.com/archive/1/535810/100/0/threaded
- http://www.securityfocus.com/bid/75327
- http://www.securitytracker.com/id/1032690
- https://bugzilla.redhat.com/show_bug.cgi?id=1234975
- http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00010.html
- http://packetstormsecurity.com/files/132415/FreeRADIUS-Insufficient-CRL-Application.html
- http://www.ocert.org/advisories/ocert-2015-008.html
- http://www.securityfocus.com/archive/1/535810/100/0/threaded
- http://www.securityfocus.com/bid/75327
- http://www.securitytracker.com/id/1032690
- https://bugzilla.redhat.com/show_bug.cgi?id=1234975
Closed bugs
radclient неработоспособен без словаря
Некорректно ротируется лог
