pam_radius 1.4.0版本的pam_radius_auth.c文件中存在缓冲区错误漏洞,该漏洞源于‘memcpy()’函数未对密码长度进行正确的验证。攻击者可借助特制的密码利用该漏洞造成应用程序崩溃,并可能执行代码。
目前厂商已发布升级补丁以修复漏洞,详情请关注厂商主页:
https://github.com/FreeRADIUS/pam_radius
来源:MISC
链接:https://github.com/FreeRADIUS/pam_radius/commit/01173ec2426627dbb1e0d96c06c3ffa0b14d36d0
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/02/msg00023.html
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/08/msg00000.html
来源:UBUNTU
链接:https://usn.ubuntu.com/4290-1/
来源:UBUNTU
链接:https://usn.ubuntu.com/4290-2/
来源:CONFIRM
链接:https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-9542
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0782/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0649/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2015-9542
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2068
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156516/Ubuntu-Security-Notice-USN-4290-1.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156604/Ubuntu-Security-Notice-USN-4290-2.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0636/
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2015-9542
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1452/
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/pam-radius-buffer-overflow-via-add-password-31656
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2630/