Executive Summary

Informations
Name CVE-2014-2015 First vendor Publication 2014-11-01
Vendor Cve Last vendor Modification 2018-01-05

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Stack-based buffer overflow in the normify function in the rlm_pap module (modules/rlm_pap/rlm_pap.c) in FreeRADIUS 2.x, possibly 2.2.3 and earlier, and 3.x, possibly 3.0.1 and earlier, might allow attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password hash, as demonstrated by an SSHA hash.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2015

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:24409
 
Oval ID: oval:org.mitre.oval:def:24409
Title: USN-2122-1 -- freeradius vulnerabilities
Description: Several security issues were fixed in FreeRADIUS.
Family: unix Class: patch
Reference(s): USN-2122-1
CVE-2011-4966
CVE-2014-2015
Version: 5
Platform(s): Ubuntu 13.10
Ubuntu 12.10
Ubuntu 12.04
Ubuntu 10.04
Product(s): freeradius
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:25164
 
Oval ID: oval:org.mitre.oval:def:25164
Title: SUSE-SU-2014:0525-1 -- Security update for freeradius
Description: This update fixes a denial of service (crash) security issue rlm_pap hash processing in FreeRadius, which could have been caused by special passwords fed into the RLM-PAP password checking method via LDAP by remote attackers. Security Issue reference: * CVE-2014-2015 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2015 >
Family: unix Class: patch
Reference(s): SUSE-SU-2014:0525-1
CVE-2014-2015
Version: 3
Platform(s): SUSE Linux Enterprise Server 11
Product(s): freeradius
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 24

Nessus® Vulnerability Scanner

Date Description
2017-06-06 Name : The remote Debian host is missing a security update.
File : debian_DLA-977.nasl - Type : ACT_GATHER_INFO
2015-08-18 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2015-581.nasl - Type : ACT_GATHER_INFO
2015-08-04 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20150722_freeradius_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2015-07-30 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2015-1287.nasl - Type : ACT_GATHER_INFO
2015-07-28 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2015-1287.nasl - Type : ACT_GATHER_INFO
2015-07-23 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2015-1287.nasl - Type : ACT_GATHER_INFO
2014-06-16 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201406-12.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-191.nasl - Type : ACT_GATHER_INFO
2014-04-15 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_freeradius-server-140228.nasl - Type : ACT_GATHER_INFO
2014-03-14 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2014-058.nasl - Type : ACT_GATHER_INFO
2014-03-10 Name : The remote Fedora host is missing a security update.
File : fedora_2014-3184.nasl - Type : ACT_GATHER_INFO
2014-03-10 Name : The remote Fedora host is missing a security update.
File : fedora_2014-3192.nasl - Type : ACT_GATHER_INFO
2014-02-27 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2122-1.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/65581
CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=1066761
MLIST http://lists.freebsd.org/pipermail/freebsd-bugbusters/2014-February/000610.html
http://lists.freebsd.org/pipermail/freebsd-bugbusters/2014-February/000612.html
http://lists.freebsd.org/pipermail/freebsd-bugbusters/2014-February/000616.html
http://www.openwall.com/lists/oss-security/2014/02/18/3
REDHAT http://rhn.redhat.com/errata/RHSA-2015-1287.html
UBUNTU http://ubuntu.com/usn/usn-2122-1

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
Date Informations
2021-05-04 12:30:46
  • Multiple Updates
2021-04-22 01:37:17
  • Multiple Updates
2020-05-23 00:40:21
  • Multiple Updates
2018-01-05 09:23:22
  • Multiple Updates
2017-06-07 13:24:43
  • Multiple Updates
2016-11-29 00:24:52
  • Multiple Updates
2016-04-27 00:25:45
  • Multiple Updates
2015-12-05 13:26:31
  • Multiple Updates
2015-08-19 13:30:06
  • Multiple Updates
2015-08-12 13:32:55
  • Multiple Updates
2015-07-31 13:28:37
  • Multiple Updates
2015-07-24 13:29:05
  • Multiple Updates
2014-11-04 09:24:36
  • Multiple Updates
2014-11-02 09:25:16
  • First insertion