Vulnerability Description
eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Point-To-Point Protocol Project | Point-To-Point Protocol | >= 2.4.2, <= 2.4.8 |
| Wago | Pfc Firmware | < 03.04.10\(16\) |
| Wago | Pfc100 | - |
| Wago | Pfc200 | - |
| Debian | Debian Linux | 9.0 |
| Canonical | Ubuntu Linux | 12.04 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00006.htmlMailing ListThird Party Advisory
- http://packetstormsecurity.com/files/156662/pppd-2.4.8-Buffer-Overflow.htmlThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/156802/pppd-2.4.8-Buffer-Overflow.htmlThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2020/Mar/6Mailing ListThird Party Advisory
- https://access.redhat.com/errata/RHSA-2020:0630Third Party Advisory
- https://access.redhat.com/errata/RHSA-2020:0631Third Party Advisory
- https://access.redhat.com/errata/RHSA-2020:0633Third Party Advisory
- https://access.redhat.com/errata/RHSA-2020:0634Third Party Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-809841.pdfThird Party Advisory
- https://github.com/paulusmack/ppp/commit/8d7970b8f3db727fe798b65f3377fe678757542PatchThird Party Advisory
- https://kb.netgear.com/000061806/Security-Advisory-for-Unauthenticated-Remote-BuThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/02/msg00005.htmlMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://security.gentoo.org/glsa/202003-19Third Party Advisory
FAQ
What is CVE-2020-8597?
CVE-2020-8597 is a vulnerability with a CVSS score of 9.8 (CRITICAL). eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions.
How severe is CVE-2020-8597?
CVE-2020-8597 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-8597?
Check the references section above for vendor advisories and patch information. Affected products include: Point-To-Point Protocol Project Point-To-Point Protocol, Wago Pfc Firmware, Wago Pfc100, Wago Pfc200, Debian Debian Linux.