HomeFreeradiusCVE-2014-2015

CVE-2014-2015

UNKNOWN
7.5CVSS
Published: 2014-11-02
Updated: 2025-04-12
AI Analysis

Description

Stack-based buffer overflow in the normify function in the rlm_pap module (modules/rlm_pap/rlm_pap.c) in FreeRADIUS 2.x, possibly 2.2.3 and earlier, and 3.x, possibly 3.0.1 and earlier, might allow attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password hash, as demonstrated by an SSHA hash.

CVSS Metrics

Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
Access Vector
network
Access Cmplx
low
Auth
none
Confidentiality
partial
Integrity
partial
Availability
partial
Weaknesses
CWE-119

Metadata

Primary Vendor
FREERADIUS
Published
11/2/2014
Last Modified
4/12/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

freeradius : freeradiusfreeradius : freeradiusfreeradius : freeradiusfreeradius : freeradiusfreeradius : freeradiusfreeradius : freeradiusfreeradius : freeradiusfreeradius : freeradiusfreeradius : freeradiusfreeradius : freeradiusfreeradius : freeradiusfreeradius : freeradiusfreeradius : freeradiusfreeradius : freeradiusfreeradius : freeradiusfreeradius : freeradiusfreeradius : freeradiusfreeradius : freeradiusfreeradius : freeradiusfreeradius : freeradiusfreeradius : freeradiusfreeradius : freeradiusfreeradius : freeradiusfreeradius : freeradius

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2014-2015 | UNKNOWN Severity | CVEDatabase.com | CVEDatabase.com