The rad_packet_recv function in opt/src/accel-pppd/radius...
Critical severity
Unreviewed
Published
Feb 15, 2022
to the GitHub Advisory Database
•
Updated Feb 3, 2023
Description
Published by the National Vulnerability Database
Feb 14, 2022
Published to the GitHub Advisory Database
Feb 15, 2022
Last updated
Feb 3, 2023
The rad_packet_recv function in opt/src/accel-pppd/radius/packet.c suffers from a buffer overflow vulnerability, whereby user input len is copied into a fixed buffer &attr->val.integer without any bound checks. If the client connects to the server and sends a large radius packet, a buffer overflow vulnerability will be triggered.
References