CVE-2021-42870
- EPSS 0.27%
- Veröffentlicht 16.05.2022 14:15:07
- Zuletzt bearbeitet 21.11.2024 06:28:15
ACCEL-PPP 1.12.0 has an out-of-bounds read in post_msg when processing a call_clear_request.
CVE-2022-0982
- EPSS 0.43%
- Veröffentlicht 16.03.2022 15:15:16
- Zuletzt bearbeitet 21.11.2024 06:39:47
The telnet_input_char function in opt/src/accel-pppd/cli/telnet.c suffers from a memory corruption vulnerability, whereby user input cmdline_len is copied into a fixed buffer b->buf without any bound checks. If the server connects with a malicious cl...
CVE-2022-24704
- EPSS 0.46%
- Veröffentlicht 14.02.2022 22:15:08
- Zuletzt bearbeitet 21.11.2024 06:50:54
The rad_packet_recv function in opt/src/accel-pppd/radius/packet.c suffers from a buffer overflow vulnerability, whereby user input len is copied into a fixed buffer &attr->val.integer without any bound checks. If the client connects to the server an...
CVE-2022-24705
- EPSS 0.46%
- Veröffentlicht 14.02.2022 22:15:08
- Zuletzt bearbeitet 21.11.2024 06:50:54
The rad_packet_recv function in radius/packet.c suffers from a memcpy buffer overflow, resulting in an overly-large recvfrom into a fixed buffer that causes a buffer overflow and overwrites arbitrary memory. If the server connects with a malicious cl...
CVE-2021-42054
- EPSS 0.26%
- Veröffentlicht 07.10.2021 06:15:07
- Zuletzt bearbeitet 21.11.2024 06:27:09
ACCEL-PPP 1.12.0 has an out-of-bounds read in triton_context_schedule if the client exits after authentication.
CVE-2020-28194
- EPSS 0.63%
- Veröffentlicht 01.02.2021 14:15:12
- Zuletzt bearbeitet 21.11.2024 05:22:27
Variable underflow exists in accel-ppp radius/packet.c when receiving a RADIUS vendor-specific attribute with length field is less than 2. It has an impact only when the attacker controls the RADIUS server, which can lead to arbitrary code execution.
CVE-2020-15173
- EPSS 0.46%
- Veröffentlicht 09.09.2020 23:15:10
- Zuletzt bearbeitet 21.11.2024 05:05:00
In ACCEL-PPP (an implementation of PPTP/PPPoE/L2TP/SSTP), there is a buffer overflow when receiving an l2tp control packet ith an AVP which type is a string and no hidden flags, length set to less than 6. If your application is used in open networks ...