An out-of-bounds read flaw related to the assess_packet function in eapmd5pass.c:211 was found in the way eapmd5pass 1.4 handled processing of network packets. A remote attacker could potentially use this flaw to crash the eapmd5pass process under certain circumstances by generating specially crafted network traffic.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://openwall.com/lists/oss-security/2017/07/31/3 | mailing list exploit third party advisory |