Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gxcf-jm3m-9c7x

Опубликовано: 15 фев. 2022
Источник: github
Github: Не прошло ревью

Описание

The rad_packet_recv function in opt/src/accel-pppd/radius/packet.c suffers from a buffer overflow vulnerability, whereby user input len is copied into a fixed buffer &attr->val.integer without any bound checks. If the client connects to the server and sends a large radius packet, a buffer overflow vulnerability will be triggered.

The rad_packet_recv function in opt/src/accel-pppd/radius/packet.c suffers from a buffer overflow vulnerability, whereby user input len is copied into a fixed buffer &attr->val.integer without any bound checks. If the client connects to the server and sends a large radius packet, a buffer overflow vulnerability will be triggered.

EPSS

Процентиль: 64%
0.00459
Низкий

Дефекты

CWE-120

Связанные уязвимости

CVSS3: 9.8
nvd
почти 4 года назад

The rad_packet_recv function in opt/src/accel-pppd/radius/packet.c suffers from a buffer overflow vulnerability, whereby user input len is copied into a fixed buffer &attr->val.integer without any bound checks. If the client connects to the server and sends a large radius packet, a buffer overflow vulnerability will be triggered.

EPSS

Процентиль: 64%
0.00459
Низкий

Дефекты

CWE-120