CVE-2020-7466

The PPP implementation of MPD before 5.9 allows a remote attacker who can send specifically crafted PPP authentication message to cause the daemon to read beyond allocated memory buffer, which would result in a denial of service condition.
References
Link Resource
https://sourceforge.net/p/mpd/bugs/69/ Exploit Third Party Advisory
https://sourceforge.net/p/mpd/svn/2374/ Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:mpd_project:mpd:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*
cpe:2.3:a:stormshield:stormshield_network_security:4.4.0:*:*:*:*:*:*:*

History

19 Jul 2023, 00:56

Type Values Removed Values Added
First Time Stormshield stormshield Network Security
Stormshield
CPE cpe:2.3:a:stormshield:stormshield_network_security:4.4.0:*:*:*:*:*:*:*
cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*

Information

Published : 2020-10-06 14:15

Updated : 2023-12-10 13:41


NVD link : CVE-2020-7466

Mitre link : CVE-2020-7466

CVE.ORG link : CVE-2020-7466


JSON object : View

Products Affected

stormshield

  • stormshield_network_security

mpd_project

  • mpd
CWE
CWE-125

Out-of-bounds Read