Accel-ppp

Accel-ppp

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.27%
  • Veröffentlicht 16.05.2022 14:15:07
  • Zuletzt bearbeitet 21.11.2024 06:28:15

ACCEL-PPP 1.12.0 has an out-of-bounds read in post_msg when processing a call_clear_request.

  • EPSS 0.43%
  • Veröffentlicht 16.03.2022 15:15:16
  • Zuletzt bearbeitet 21.11.2024 06:39:47

The telnet_input_char function in opt/src/accel-pppd/cli/telnet.c suffers from a memory corruption vulnerability, whereby user input cmdline_len is copied into a fixed buffer b->buf without any bound checks. If the server connects with a malicious cl...

  • EPSS 0.46%
  • Veröffentlicht 14.02.2022 22:15:08
  • Zuletzt bearbeitet 21.11.2024 06:50:54

The rad_packet_recv function in opt/src/accel-pppd/radius/packet.c suffers from a buffer overflow vulnerability, whereby user input len is copied into a fixed buffer &attr->val.integer without any bound checks. If the client connects to the server an...

  • EPSS 0.46%
  • Veröffentlicht 14.02.2022 22:15:08
  • Zuletzt bearbeitet 21.11.2024 06:50:54

The rad_packet_recv function in radius/packet.c suffers from a memcpy buffer overflow, resulting in an overly-large recvfrom into a fixed buffer that causes a buffer overflow and overwrites arbitrary memory. If the server connects with a malicious cl...

Exploit
  • EPSS 0.26%
  • Veröffentlicht 07.10.2021 06:15:07
  • Zuletzt bearbeitet 21.11.2024 06:27:09

ACCEL-PPP 1.12.0 has an out-of-bounds read in triton_context_schedule if the client exits after authentication.

  • EPSS 0.63%
  • Veröffentlicht 01.02.2021 14:15:12
  • Zuletzt bearbeitet 21.11.2024 05:22:27

Variable underflow exists in accel-ppp radius/packet.c when receiving a RADIUS vendor-specific attribute with length field is less than 2. It has an impact only when the attacker controls the RADIUS server, which can lead to arbitrary code execution.

  • EPSS 0.46%
  • Veröffentlicht 09.09.2020 23:15:10
  • Zuletzt bearbeitet 21.11.2024 05:05:00

In ACCEL-PPP (an implementation of PPTP/PPPoE/L2TP/SSTP), there is a buffer overflow when receiving an l2tp control packet ith an AVP which type is a string and no hidden flags, length set to less than 6. If your application is used in open networks ...