CVE-2020-8597

eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00006.html Mailing List Third Party Advisory
http://packetstormsecurity.com/files/156662/pppd-2.4.8-Buffer-Overflow.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/156802/pppd-2.4.8-Buffer-Overflow.html Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2020/Mar/6 Mailing List Third Party Advisory
https://access.redhat.com/errata/RHSA-2020:0630 Third Party Advisory
https://access.redhat.com/errata/RHSA-2020:0631 Third Party Advisory
https://access.redhat.com/errata/RHSA-2020:0633 Third Party Advisory
https://access.redhat.com/errata/RHSA-2020:0634 Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-809841.pdf Third Party Advisory
https://github.com/paulusmack/ppp/commit/8d7970b8f3db727fe798b65f3377fe6787575426 Patch Third Party Advisory
https://kb.netgear.com/000061806/Security-Advisory-for-Unauthenticated-Remote-Buffer-Overflow-Attack-in-PPPD-on-WAC510-PSV-2020-0136 Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/02/msg00005.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UNJNHWOO4XF73M2W56ILZUY4JQG3JXIR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOFDAIOWSWPG732ASYUZNINMXDHY4APE/
https://security.gentoo.org/glsa/202003-19 Third Party Advisory
https://security.netapp.com/advisory/ntap-20200313-0004/ Third Party Advisory
https://us-cert.cisa.gov/ics/advisories/icsa-20-224-04 Third Party Advisory US Government Resource
https://usn.ubuntu.com/4288-1/ Third Party Advisory
https://usn.ubuntu.com/4288-2/ Third Party Advisory
https://www.debian.org/security/2020/dsa-4632 Third Party Advisory
https://www.kb.cert.org/vuls/id/782301 Third Party Advisory US Government Resource
https://www.synology.com/security/advisory/Synology_SA_20_02 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:point-to-point_protocol_project:point-to-point_protocol:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:wago:pfc_firmware:*:*:*:*:*:*:*:*
OR cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*
cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*

History

05 May 2023, 17:48

Type Values Removed Values Added
CPE cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*
cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:wago:pfc_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
References (REDHAT) https://access.redhat.com/errata/RHSA-2020:0631 - (REDHAT) https://access.redhat.com/errata/RHSA-2020:0631 - Third Party Advisory
References (UBUNTU) https://usn.ubuntu.com/4288-2/ - (UBUNTU) https://usn.ubuntu.com/4288-2/ - Third Party Advisory
References (MISC) https://cert-portal.siemens.com/productcert/pdf/ssa-809841.pdf - (MISC) https://cert-portal.siemens.com/productcert/pdf/ssa-809841.pdf - Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/156662/pppd-2.4.8-Buffer-Overflow.html - (MISC) http://packetstormsecurity.com/files/156662/pppd-2.4.8-Buffer-Overflow.html - Third Party Advisory, VDB Entry
References (MLIST) https://lists.debian.org/debian-lts-announce/2020/02/msg00005.html - (MLIST) https://lists.debian.org/debian-lts-announce/2020/02/msg00005.html - Mailing List, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOFDAIOWSWPG732ASYUZNINMXDHY4APE/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOFDAIOWSWPG732ASYUZNINMXDHY4APE/ - Mailing List, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UNJNHWOO4XF73M2W56ILZUY4JQG3JXIR/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UNJNHWOO4XF73M2W56ILZUY4JQG3JXIR/ - Mailing List, Third Party Advisory
References (CONFIRM) https://kb.netgear.com/000061806/Security-Advisory-for-Unauthenticated-Remote-Buffer-Overflow-Attack-in-PPPD-on-WAC510-PSV-2020-0136 - (CONFIRM) https://kb.netgear.com/000061806/Security-Advisory-for-Unauthenticated-Remote-Buffer-Overflow-Attack-in-PPPD-on-WAC510-PSV-2020-0136 - Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20200313-0004/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20200313-0004/ - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2020:0633 - (REDHAT) https://access.redhat.com/errata/RHSA-2020:0633 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2020:0634 - (REDHAT) https://access.redhat.com/errata/RHSA-2020:0634 - Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/156802/pppd-2.4.8-Buffer-Overflow.html - (MISC) http://packetstormsecurity.com/files/156802/pppd-2.4.8-Buffer-Overflow.html - Third Party Advisory, VDB Entry
References (CERT-VN) https://www.kb.cert.org/vuls/id/782301 - (CERT-VN) https://www.kb.cert.org/vuls/id/782301 - Third Party Advisory, US Government Resource
References (REDHAT) https://access.redhat.com/errata/RHSA-2020:0630 - (REDHAT) https://access.redhat.com/errata/RHSA-2020:0630 - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00006.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00006.html - Mailing List, Third Party Advisory
References (UBUNTU) https://usn.ubuntu.com/4288-1/ - (UBUNTU) https://usn.ubuntu.com/4288-1/ - Third Party Advisory
References (MISC) https://us-cert.cisa.gov/ics/advisories/icsa-20-224-04 - (MISC) https://us-cert.cisa.gov/ics/advisories/icsa-20-224-04 - Third Party Advisory, US Government Resource
References (GENTOO) https://security.gentoo.org/glsa/202003-19 - (GENTOO) https://security.gentoo.org/glsa/202003-19 - Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2020/Mar/6 - (FULLDISC) http://seclists.org/fulldisclosure/2020/Mar/6 - Mailing List, Third Party Advisory
References (CONFIRM) https://www.synology.com/security/advisory/Synology_SA_20_02 - (CONFIRM) https://www.synology.com/security/advisory/Synology_SA_20_02 - Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2020/dsa-4632 - (DEBIAN) https://www.debian.org/security/2020/dsa-4632 - Third Party Advisory

Information

Published : 2020-02-03 23:15

Updated : 2024-02-04 20:39


NVD link : CVE-2020-8597

Mitre link : CVE-2020-8597

CVE.ORG link : CVE-2020-8597


JSON object : View

Products Affected

point-to-point_protocol_project

  • point-to-point_protocol

wago

  • pfc100
  • pfc_firmware
  • pfc200

canonical

  • ubuntu_linux

debian

  • debian_linux
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')