Buffer Overflow Vulnerability in rad_packet_recv Function

Buffer Overflow Vulnerability in rad_packet_recv Function

CVE-2022-24704 · CRITICAL Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

The rad_packet_recv function in opt/src/accel-pppd/radius/packet.c suffers from a buffer overflow vulnerability, whereby user input len is copied into a fixed buffer &attr->val.integer without any bound checks. If the client connects to the server and sends a large radius packet, a buffer overflow vulnerability will be triggered.

Learn more about our Cis Benchmark Audit For Server Software.