gentoo-overlay/metadata/glsa/glsa-201406-12.xml

54 lines
1.8 KiB
XML
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201406-12">
<title>FreeRADIUS: Arbitrary code execution</title>
<synopsis>A vulnerability in FreeRADIUS can lead to arbitrary code execution
or Denial of Service by authenticated users.
</synopsis>
<product type="ebuild">freeradius</product>
<announced>2014-06-15</announced>
<revised count="1">2014-06-15</revised>
<bug>501754</bug>
<access>remote</access>
<affected>
<package name="net-dialup/freeradius" auto="yes" arch="*">
<unaffected range="ge">2.2.5</unaffected>
<vulnerable range="lt">2.2.5</vulnerable>
</package>
</affected>
<background>
<p>FreeRADIUS is an open source RADIUS authentication server.</p>
</background>
<description>
<p>Large passwords can trigger a stack-based buffer overflow in
FreeRADIUSs rlm_pap module when authenticating against an LDAP server.
</p>
</description>
<impact type="high">
<p>An authenticated user could set a specially crafted long password,
possibly leading to arbitrary code execution or a Denial of Service
condition.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All FreeRADIUS users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=net-dialup/freeradius-2.2.5"
</code>
</resolution>
<references>
<uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2015">CVE-2014-2015</uri>
</references>
<metadata tag="requester" timestamp="2014-05-20T04:12:59Z">
BlueKnight
</metadata>
<metadata tag="submitter" timestamp="2014-06-15T00:12:35Z">
creffett
</metadata>
</glsa>