CVE-2020-8597

eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00006.html Mailing List Third Party Advisory
http://packetstormsecurity.com/files/156662/pppd-2.4.8-Buffer-Overflow.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/156802/pppd-2.4.8-Buffer-Overflow.html Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2020/Mar/6 Mailing List Third Party Advisory
https://access.redhat.com/errata/RHSA-2020:0630 Third Party Advisory
https://access.redhat.com/errata/RHSA-2020:0631 Third Party Advisory
https://access.redhat.com/errata/RHSA-2020:0633 Third Party Advisory
https://access.redhat.com/errata/RHSA-2020:0634 Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-809841.pdf Third Party Advisory
https://github.com/paulusmack/ppp/commit/8d7970b8f3db727fe798b65f3377fe6787575426 Patch Third Party Advisory
https://kb.netgear.com/000061806/Security-Advisory-for-Unauthenticated-Remote-Buffer-Overflow-Attack-in-PPPD-on-WAC510-PSV-2020-0136 Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/02/msg00005.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UNJNHWOO4XF73M2W56ILZUY4JQG3JXIR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOFDAIOWSWPG732ASYUZNINMXDHY4APE/
https://security.gentoo.org/glsa/202003-19 Third Party Advisory
https://security.netapp.com/advisory/ntap-20200313-0004/ Third Party Advisory
https://us-cert.cisa.gov/ics/advisories/icsa-20-224-04 Third Party Advisory US Government Resource
https://usn.ubuntu.com/4288-1/ Third Party Advisory
https://usn.ubuntu.com/4288-2/ Third Party Advisory
https://www.debian.org/security/2020/dsa-4632 Third Party Advisory
https://www.kb.cert.org/vuls/id/782301 Third Party Advisory US Government Resource
https://www.synology.com/security/advisory/Synology_SA_20_02 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00006.html Mailing List Third Party Advisory
http://packetstormsecurity.com/files/156662/pppd-2.4.8-Buffer-Overflow.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/156802/pppd-2.4.8-Buffer-Overflow.html Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2020/Mar/6 Mailing List Third Party Advisory
https://access.redhat.com/errata/RHSA-2020:0630 Third Party Advisory
https://access.redhat.com/errata/RHSA-2020:0631 Third Party Advisory
https://access.redhat.com/errata/RHSA-2020:0633 Third Party Advisory
https://access.redhat.com/errata/RHSA-2020:0634 Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-809841.pdf Third Party Advisory
https://github.com/paulusmack/ppp/commit/8d7970b8f3db727fe798b65f3377fe6787575426 Patch Third Party Advisory
https://kb.netgear.com/000061806/Security-Advisory-for-Unauthenticated-Remote-Buffer-Overflow-Attack-in-PPPD-on-WAC510-PSV-2020-0136 Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/02/msg00005.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UNJNHWOO4XF73M2W56ILZUY4JQG3JXIR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOFDAIOWSWPG732ASYUZNINMXDHY4APE/
https://security.gentoo.org/glsa/202003-19 Third Party Advisory
https://security.netapp.com/advisory/ntap-20200313-0004/ Third Party Advisory
https://us-cert.cisa.gov/ics/advisories/icsa-20-224-04 Third Party Advisory US Government Resource
https://usn.ubuntu.com/4288-1/ Third Party Advisory
https://usn.ubuntu.com/4288-2/ Third Party Advisory
https://www.debian.org/security/2020/dsa-4632 Third Party Advisory
https://www.kb.cert.org/vuls/id/782301 Third Party Advisory US Government Resource
https://www.synology.com/security/advisory/Synology_SA_20_02 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:point-to-point_protocol_project:point-to-point_protocol:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:wago:pfc_firmware:*:*:*:*:*:*:*:*
OR cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*
cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*

History

21 Nov 2024, 05:39

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00006.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00006.html - Mailing List, Third Party Advisory
References () http://packetstormsecurity.com/files/156662/pppd-2.4.8-Buffer-Overflow.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/156662/pppd-2.4.8-Buffer-Overflow.html - Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/156802/pppd-2.4.8-Buffer-Overflow.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/156802/pppd-2.4.8-Buffer-Overflow.html - Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2020/Mar/6 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2020/Mar/6 - Mailing List, Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2020:0630 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2020:0630 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2020:0631 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2020:0631 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2020:0633 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2020:0633 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2020:0634 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2020:0634 - Third Party Advisory
References () https://cert-portal.siemens.com/productcert/pdf/ssa-809841.pdf - Third Party Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-809841.pdf - Third Party Advisory
References () https://github.com/paulusmack/ppp/commit/8d7970b8f3db727fe798b65f3377fe6787575426 - Patch, Third Party Advisory () https://github.com/paulusmack/ppp/commit/8d7970b8f3db727fe798b65f3377fe6787575426 - Patch, Third Party Advisory
References () https://kb.netgear.com/000061806/Security-Advisory-for-Unauthenticated-Remote-Buffer-Overflow-Attack-in-PPPD-on-WAC510-PSV-2020-0136 - Third Party Advisory () https://kb.netgear.com/000061806/Security-Advisory-for-Unauthenticated-Remote-Buffer-Overflow-Attack-in-PPPD-on-WAC510-PSV-2020-0136 - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2020/02/msg00005.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2020/02/msg00005.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UNJNHWOO4XF73M2W56ILZUY4JQG3JXIR/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UNJNHWOO4XF73M2W56ILZUY4JQG3JXIR/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOFDAIOWSWPG732ASYUZNINMXDHY4APE/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOFDAIOWSWPG732ASYUZNINMXDHY4APE/ -
References () https://security.gentoo.org/glsa/202003-19 - Third Party Advisory () https://security.gentoo.org/glsa/202003-19 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20200313-0004/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20200313-0004/ - Third Party Advisory
References () https://us-cert.cisa.gov/ics/advisories/icsa-20-224-04 - Third Party Advisory, US Government Resource () https://us-cert.cisa.gov/ics/advisories/icsa-20-224-04 - Third Party Advisory, US Government Resource
References () https://usn.ubuntu.com/4288-1/ - Third Party Advisory () https://usn.ubuntu.com/4288-1/ - Third Party Advisory
References () https://usn.ubuntu.com/4288-2/ - Third Party Advisory () https://usn.ubuntu.com/4288-2/ - Third Party Advisory
References () https://www.debian.org/security/2020/dsa-4632 - Third Party Advisory () https://www.debian.org/security/2020/dsa-4632 - Third Party Advisory
References () https://www.kb.cert.org/vuls/id/782301 - Third Party Advisory, US Government Resource () https://www.kb.cert.org/vuls/id/782301 - Third Party Advisory, US Government Resource
References () https://www.synology.com/security/advisory/Synology_SA_20_02 - Third Party Advisory () https://www.synology.com/security/advisory/Synology_SA_20_02 - Third Party Advisory

07 Nov 2023, 03:26

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOFDAIOWSWPG732ASYUZNINMXDHY4APE/', 'name': 'FEDORA-2020-4304397fe0', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UNJNHWOO4XF73M2W56ILZUY4JQG3JXIR/', 'name': 'FEDORA-2020-571091c70b', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOFDAIOWSWPG732ASYUZNINMXDHY4APE/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UNJNHWOO4XF73M2W56ILZUY4JQG3JXIR/ -

Information

Published : 2020-02-03 23:15

Updated : 2024-11-21 05:39


NVD link : CVE-2020-8597

Mitre link : CVE-2020-8597

CVE.ORG link : CVE-2020-8597


JSON object : View

Products Affected

wago

  • pfc200
  • pfc_firmware
  • pfc100

canonical

  • ubuntu_linux

point-to-point_protocol_project

  • point-to-point_protocol

debian

  • debian_linux
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')