The EAP-PWD module in FreeRADIUS 3.0 through 3.0.8 allows remote attackers to have unspecified impact via a crafted (1) commit or (2) confirm message, which triggers an out-of-bounds read.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://freeradius.org/security.html#eap-pwd-2015 | not applicable |
http://www.openwall.com/lists/oss-security/2016/01/08/7 | mailing list third party advisory patch |