CVE-2015-8763

The EAP-PWD module in FreeRADIUS 3.0 through 3.0.8 allows remote attackers to have unspecified impact via a crafted (1) commit or (2) confirm message, which triggers an out-of-bounds read.
References
Link Resource
http://www.openwall.com/lists/oss-security/2016/01/08/7 Mailing List Patch Third Party Advisory
http://freeradius.org/security.html#eap-pwd-2015 Not Applicable
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:freeradius:freeradius:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.7:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.8:*:*:*:*:*:*:*

Information

Published : 2017-03-27 10:59

Updated : 2017-03-30 05:31


NVD link : CVE-2015-8763

Mitre link : CVE-2015-8763


JSON object : View

CWE
CWE-125

Out-of-bounds Read

Advertisement

dedicated server usa

Products Affected

freeradius

  • freeradius