Buffer Overflow Affecting accel-ppp/accel-ppp package, versions [,1.10.0)


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.46% (64th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-ACCELPPPACCELPPP-2367139
  • published26 Jan 2022
  • disclosed9 Sept 2020
  • creditUnknown

Introduced: 9 Sep 2020

CVE-2020-15173  (opens in a new tab)
CWE-120  (opens in a new tab)

How to fix?

Upgrade accel-ppp/accel-ppp to version 1.10.0 or higher.

Overview

Affected versions of this package are vulnerable to Buffer Overflow. In ACCEL-PPP (an implementation of PPTP/PPPoE/L2TP/SSTP), there is a buffer overflow when receiving an l2tp control packet ith an AVP which type is a string and no hidden flags, length set to less than 6. If your application is used in open networks or there are untrusted nodes in the network it is highly recommended to apply the patch. The problem was patched with commit 2324bcd5ba12cf28f47357a8f03cd41b7c04c52b As a workaround changes of commit 2324bcd5ba12cf28f47357a8f03cd41b7c04c52b can be applied to older versions.

CVSS Base Scores

version 3.1