Buffer Overflow Affecting accel-ppp/accel-ppp package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.44% (63rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-ACCELPPPACCELPPP-2401808
  • published18 Feb 2022
  • disclosed16 Feb 2022
  • creditspaceraccoon

Introduced: 16 Feb 2022

CVE-2022-24704  (opens in a new tab)
CWE-119  (opens in a new tab)
CWE-120  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

Affected versions of this package are vulnerable to Buffer Overflow. The rad_packet_recv function in opt/src/accel-pppd/radius/packet.c suffers from memcpy buffer overflow vulnerability, whereby user input length is copied into a fixed buffer &attr->val.integer without any bound checks. If the client connects to the server and sends a large radius packet, a buffer overflow vulnerability will be triggered.

CVSS Base Scores

version 3.1