The telnet_input_char function in opt/src/accel-pppd/cli...
Critical severity
Unreviewed
Published
Mar 17, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
Mar 16, 2022
Published to the GitHub Advisory Database
Mar 17, 2022
Last updated
Jan 27, 2023
The telnet_input_char function in opt/src/accel-pppd/cli/telnet.c suffers from a memory corruption vulnerability, whereby user input cmdline_len is copied into a fixed buffer b->buf without any bound checks. If the server connects with a malicious client, crafted client requests can remotely trigger this vulnerability.
References