Bug 1218467 (CVE-2015-8762, CVE-2015-8763, CVE-2015-8764) - CVE-2015-8762 CVE-2015-8763 CVE-2015-8764 freeradius: the EAP-PWD module performs insufficient validation on packets received from an EAP peer
Summary: CVE-2015-8762 CVE-2015-8763 CVE-2015-8764 freeradius: the EAP-PWD module perf...
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2015-8762, CVE-2015-8763, CVE-2015-8764
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1248894
Blocks: 1218471
TreeView+ depends on / blocked
 
Reported: 2015-05-05 01:41 UTC by Fabio Olive Leite
Modified: 2021-02-17 05:19 UTC (History)
6 users (show)

Fixed In Version: FreeRADIUS 3.0.9
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-08-02 03:30:12 UTC
Embargoed:


Attachments (Terms of Use)

Description Fabio Olive Leite 2015-05-05 01:41:53 UTC
The FreeRADIUS project has reported a flaw that affects the EAP-PWD module
of the freeradius package versions 3.0 up to 3.0.8. This module is not
enabled by default, so administrators must have manually enabled it for
their servers to be vulnerable.

External References:

http://freeradius.org/security.html#eap-pwd-2015

Comment 1 Huzaifa S. Sidhpurwala 2015-07-31 06:28:13 UTC
CVE Request:

http://seclists.org/oss-sec/2015/q3/261

Comment 2 Huzaifa S. Sidhpurwala 2015-07-31 06:30:33 UTC
Statement:

This issue affects the version of freeradius as shipped with Red Hat Enterprise Linux 7. Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates.

Comment 3 Huzaifa S. Sidhpurwala 2015-07-31 06:32:55 UTC
Created freeradius tracking bugs for this issue:

Affects: fedora-all [bug 1248894]

Comment 5 Adam Mariš 2016-01-11 13:31:28 UTC
Three CVEs were assigned (http://seclists.org/oss-sec/2016/q1/52):

CVE-2015-8762: The EAP-PWD packet length is not checked before the first byte is
dereferenced. A zero-length EAP-PWD packet will cause the module to
dereference a NULL pointer, and will cause the server to crash.

CVE-2015-8763: The commit message payload length is not validated before the packet is decoded. This can result in a read overflow in the server. The confirm message payload length is not validated before the packet is decoded. This can result in a read overflow in the server.

CVE-2015-8764: A strcpy() was used to pack a C string into an EAP-PWD packet. This would result in an over-run of the destination buffer by one byte.


Note You need to log in before you can comment on or make changes to this bug.