A length validation (leading to out-of-bounds read and write) flaw was found in the way eapmd5pass 1.4 handled network traffic in the extract_eapusername function. A remote attacker could potentially use this flaw to crash the eapmd5pass process by generating specially crafted network traffic.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://openwall.com/lists/oss-security/2017/07/31/3 | mailing list exploit third party advisory |