CVE-2022-24704
14.02.2022, 22:15
The rad_packet_recv function in opt/src/accel-pppd/radius/packet.c suffers from a buffer overflow vulnerability, whereby user input len is copied into a fixed buffer &attr->val.integer without any bound checks. If the client connects to the server and sends a large radius packet, a buffer overflow vulnerability will be triggered.
Vendor | Product | Version |
---|---|---|
accel-ppp | accel-ppp | 𝑥 ≤ 1.12.0 |
𝑥
= Vulnerable software versions