Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Sun, 16 Feb 2014 10:45:12 +0100
From: Florian Weimer <fw@...eb.enyo.de>
To: oss-security@...ts.openwall.com
Subject: CVE request: freeradius denial of service in rlm_pap hash processing

SSHA (and presumably SSHA) processing runs into a stack-based buffer
overflow in the freeradius rlm_pap module if the password source uses
an unusually long hashed password, as reported publicly here:

<http://lists.freebsd.org/pipermail/freebsd-bugbusters/2014-February/000610.html>

(Also see the discussion in the follow-ups.)

Fix for 2.x:

<https://github.com/FreeRADIUS/freeradius-server/commit/0d606cfc29a.patch>

Fix for 3.x:

<https://github.com/FreeRADIUS/freeradius-server/commit/ff5147c9e5088c7.patch>

Fix for the master branch:

<https://github.com/FreeRADIUS/freeradius-server/commit/f610864d4c8f51d.patch>

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ