CVE-2015-8764

Off-by-one error in the EAP-PWD module in FreeRADIUS 3.0 through 3.0.8, which triggers a buffer overflow.
References
Link Resource
http://freeradius.org/security.html#eap-pwd-2015 Not Applicable
http://www.openwall.com/lists/oss-security/2016/01/08/7 Mailing List Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:freeradius:freeradius:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.7:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.8:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-03-27 17:59

Updated : 2024-02-04 19:11


NVD link : CVE-2015-8764

Mitre link : CVE-2015-8764

CVE.ORG link : CVE-2015-8764


JSON object : View

Products Affected

freeradius

  • freeradius
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer