CVE-2022-24704

CVE-2022-24704

The rad_packet_recv function in opt/src/accel-pppd/radius/packet.c suffers from a buffer overflow vulnerability, whereby user input len is copied into a fixed buffer &attr->val.integer without any bound checks. If the client connects to the server and sends a large radius packet, a buffer overflow vulnerability will be triggered.

Source: CVE-2022-24704

답글 남기기

이메일 주소는 공개되지 않습니다. 필수 필드는 *로 표시됩니다