Lucene search

K
Accel-pppAccel-ppp

7 matches found

CVE
CVE
added 2022/02/14 10:15 p.m.109 views

CVE-2022-24705

The rad_packet_recv function in radius/packet.c suffers from a memcpy buffer overflow, resulting in an overly-large recvfrom into a fixed buffer that causes a buffer overflow and overwrites arbitrary memory. If the server connects with a malicious client, crafted client requests can remotely trigge...

9.8CVSS9.8AI score0.00436EPSS
CVE
CVE
added 2022/02/14 10:15 p.m.101 views

CVE-2022-24704

The rad_packet_recv function in opt/src/accel-pppd/radius/packet.c suffers from a buffer overflow vulnerability, whereby user input len is copied into a fixed buffer &attr->val.integer without any bound checks. If the client connects to the server and sends a large radius packet, a buffer overfl...

9.8CVSS9.8AI score0.00436EPSS
CVE
CVE
added 2022/03/16 3:15 p.m.79 views

CVE-2022-0982

The telnet_input_char function in opt/src/accel-pppd/cli/telnet.c suffers from a memory corruption vulnerability, whereby user input cmdline_len is copied into a fixed buffer b->buf without any bound checks. If the server connects with a malicious client, crafted client requests can remotely tri...

9.8CVSS9.8AI score0.00411EPSS
CVE
CVE
added 2022/05/16 2:15 p.m.60 views

CVE-2021-42870

ACCEL-PPP 1.12.0 has an out-of-bounds read in post_msg when processing a call_clear_request.

7.5CVSS7.4AI score0.00266EPSS
CVE
CVE
added 2020/09/09 11:15 p.m.54 views

CVE-2020-15173

In ACCEL-PPP (an implementation of PPTP/PPPoE/L2TP/SSTP), there is a buffer overflow when receiving an l2tp control packet ith an AVP which type is a string and no hidden flags, length set to less than 6. If your application is used in open networks or there are untrusted nodes in the network it is...

9.8CVSS9.3AI score0.00459EPSS
CVE
CVE
added 2021/02/01 2:15 p.m.53 views

CVE-2020-28194

Variable underflow exists in accel-ppp radius/packet.c when receiving a RADIUS vendor-specific attribute with length field is less than 2. It has an impact only when the attacker controls the RADIUS server, which can lead to arbitrary code execution.

9.8CVSS9.6AI score0.00633EPSS
CVE
CVE
added 2021/10/07 6:15 a.m.50 views

CVE-2021-42054

ACCEL-PPP 1.12.0 has an out-of-bounds read in triton_context_schedule if the client exits after authentication.

7.5CVSS7.4AI score0.00261EPSS