Vulnerability   
Search   
    Search 187964 CVE descriptions
and 85075 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.892304
Category:Debian Local Security Checks
Title:Debian LTS: Security Advisory for libpam-radius-auth (DLA-2304-1)
Summary:The remote host is missing an update for the 'libpam-radius-auth'; package(s) announced via the DLA-2304-1 advisory.
Description:Summary:
The remote host is missing an update for the 'libpam-radius-auth'
package(s) announced via the DLA-2304-1 advisory.

Vulnerability Insight:
`add_password` in pam_radius_auth.c in pam_radius 1.4.0 does not
correctly check the length of the input password, and is vulnerable
to a stack-based buffer overflow during memcpy(). An attacker could
send a crafted password to an application (loading the pam_radius
library) and crash it. Arbitrary code execution might be possible,
depending on the application, C library, compiler, and other factors.

Affected Software/OS:
'libpam-radius-auth' package(s) on Debian Linux.

Solution:
For Debian 9 stretch, this problem has been fixed in version
1.3.16-5+deb9u1.

We recommend that you upgrade your libpam-radius-auth packages.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-9542
https://github.com/FreeRADIUS/pam_radius/commit/01173ec2426627dbb1e0d96c06c3ffa0b14d36d0
https://lists.debian.org/debian-lts-announce/2020/02/msg00023.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00000.html
https://usn.ubuntu.com/4290-1/
https://usn.ubuntu.com/4290-2/
CopyrightCopyright (C) 2020 Greenbone Networks GmbH

This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2020 E-Soft Inc. All rights reserved.