The rad_packet_recv function in radius/packet.c suffers...
Critical severity
Unreviewed
Published
Feb 15, 2022
to the GitHub Advisory Database
•
Updated Feb 3, 2023
Description
Published by the National Vulnerability Database
Feb 14, 2022
Published to the GitHub Advisory Database
Feb 15, 2022
Last updated
Feb 3, 2023
The rad_packet_recv function in radius/packet.c suffers from a memcpy buffer overflow, resulting in an overly-large recvfrom into a fixed buffer that causes a buffer overflow and overwrites arbitrary memory. If the server connects with a malicious client, crafted client requests can remotely trigger this vulnerability.
References