Lucene search

K
cvelistGovTech CSGCVELIST:CVE-2022-0982
HistoryMar 15, 2022 - 12:00 a.m.

CVE-2022-0982 Buffer Overflow via crafted client request in Accel-PPP v1.12

2022-03-1500:00:00
GovTech CSG
www.cve.org

9.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

58.3%

The telnet_input_char function in opt/src/accel-pppd/cli/telnet.c suffers from a memory corruption vulnerability, whereby user input cmdline_len is copied into a fixed buffer b->buf without any bound checks. If the server connects with a malicious client, crafted client requests can remotely trigger this vulnerability.

CNA Affected

[
  {
    "product": "Accel-PPP",
    "vendor": "https://accel-ppp.org/",
    "versions": [
      {
        "lessThanOrEqual": "1.12",
        "status": "affected",
        "version": "1.12",
        "versionType": "custom"
      }
    ]
  }
]

9.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

58.3%

Related for CVELIST:CVE-2022-0982