← Voltar para CVEs
CVE-2020-8597
CRITICAL9.8
Descricao
eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions.
Detalhes CVE
Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado2/3/2020
Ultima modificacao12/3/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
canonical:ubuntu_linuxdebian:debian_linuxpoint-to-point_protocol_project:point-to-point_protocolwago:pfc100wago:pfc200wago:pfc_firmware
Fraquezas (CWE)
CWE-120CWE-120
Referencias
http://seclists.org/fulldisclosure/2020/Mar/6(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0630(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0631(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0633(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0634(cve@mitre.org)
https://kb.netgear.com/000061806/Security-Advisory-for-Unauthenticated-Remote-Buffer-Overflow-Attack-in-PPPD-on-WAC510-PSV-2020-0136(cve@mitre.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UNJNHWOO4XF73M2W56ILZUY4JQG3JXIR/(cve@mitre.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOFDAIOWSWPG732ASYUZNINMXDHY4APE/(cve@mitre.org)
https://security.gentoo.org/glsa/202003-19(cve@mitre.org)
https://security.netapp.com/advisory/ntap-20200313-0004/(cve@mitre.org)
https://us-cert.cisa.gov/ics/advisories/icsa-20-224-04(cve@mitre.org)
https://usn.ubuntu.com/4288-1/(cve@mitre.org)
https://usn.ubuntu.com/4288-2/(cve@mitre.org)
https://www.debian.org/security/2020/dsa-4632(cve@mitre.org)
https://www.kb.cert.org/vuls/id/782301(cve@mitre.org)
https://www.synology.com/security/advisory/Synology_SA_20_02(cve@mitre.org)
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00006.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/156662/pppd-2.4.8-Buffer-Overflow.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/156802/pppd-2.4.8-Buffer-Overflow.html(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2020/Mar/6(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0630(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0631(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0633(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0634(af854a3a-2127-422b-91ae-364da2661108)
https://cert-portal.siemens.com/productcert/pdf/ssa-809841.pdf(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/paulusmack/ppp/commit/8d7970b8f3db727fe798b65f3377fe6787575426(af854a3a-2127-422b-91ae-364da2661108)
https://kb.netgear.com/000061806/Security-Advisory-for-Unauthenticated-Remote-Buffer-Overflow-Attack-in-PPPD-on-WAC510-PSV-2020-0136(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2020/02/msg00005.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UNJNHWOO4XF73M2W56ILZUY4JQG3JXIR/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOFDAIOWSWPG732ASYUZNINMXDHY4APE/(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202003-19(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20200313-0004/(af854a3a-2127-422b-91ae-364da2661108)
https://us-cert.cisa.gov/ics/advisories/icsa-20-224-04(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4288-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4288-2/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2020/dsa-4632(af854a3a-2127-422b-91ae-364da2661108)
https://www.kb.cert.org/vuls/id/782301(af854a3a-2127-422b-91ae-364da2661108)
https://www.synology.com/security/advisory/Synology_SA_20_02(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.