The EAP-PWD module in FreeRADIUS 3.0 through 3.0.8 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a zero-length EAP-PWD packet.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
http://freeradius.org/security.html#eap-pwd-2015 | not applicable |
http://www.openwall.com/lists/oss-security/2016/01/08/7 | mailing list third party advisory patch |