CVE-2015-9542
moderate-risk
Published 2020-02-24
add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors.
Do I need to act?
~
1.9% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (8)
Affected Vendors
References (12)
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-9542
Third Party Advisory
https://usn.ubuntu.com/4290-1/
Third Party Advisory
https://usn.ubuntu.com/4290-2/
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-9542
Third Party Advisory
https://usn.ubuntu.com/4290-1/
Third Party Advisory
https://usn.ubuntu.com/4290-2/
45
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
5/34 · Minimal
Exposure
14/34 · Moderate