Description
The rad_packet_recv function in radius/packet.c suffers from a memcpy buffer overflow, resulting in an overly-large recvfrom into a fixed buffer that causes a buffer overflow and overwrites arbitrary memory. If the server connects with a malicious client, crafted client requests can remotely trigger this vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-29571 | The rad_packet_recv function in radius/packet.c suffers from a memcpy buffer overflow, resulting in an overly-large recvfrom into a fixed buffer that causes a buffer overflow and overwrites arbitrary memory. If the server connects with a malicious client, crafted client requests can remotely trigger this vulnerability. |
References
| Link | Providers |
|---|---|
| https://github.com/accel-ppp/accel-ppp/pull/35 |
|
History
No history.
Status: PUBLISHED
Assigner: GovTech CSG
Published:
Updated: 2024-09-16T18:39:19.344Z
Reserved: 2022-02-10T00:00:00.000Z
Link: CVE-2022-24705
No data.
Status : Modified
Published: 2022-02-14T22:15:08.270
Modified: 2024-11-21T06:50:54.903
Link: CVE-2022-24705
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD