addpassword in pamradiusauth.c in pamradius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1.3.17-0ubuntu4+esm1", "binary_name": "libpam-radius-auth" }, { "binary_version": "1.3.17-0ubuntu4+esm1", "binary_name": "libpam-radius-auth-dbgsym" } ] }