Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2020-8597
eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.629
EPSS Ranking
98.2%
CVSS Severity
CVSS v3 Score
9.8
CVSS v2 Score
7.5
References
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00006.html
http://packetstormsecurity.com/files/156662/pppd-2.4.8-Buffer-Overflow.html
http://packetstormsecurity.com/files/156802/pppd-2.4.8-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2020/Mar/6
https://access.redhat.com/errata/RHSA-2020:0630
https://access.redhat.com/errata/RHSA-2020:0631
https://access.redhat.com/errata/RHSA-2020:0633
https://access.redhat.com/errata/RHSA-2020:0634
https://cert-portal.siemens.com/productcert/pdf/ssa-809841.pdf
https://github.com/paulusmack/ppp/commit/8d7970b8f3db727fe798b65f3377fe6787575426
https://kb.netgear.com/000061806/Security-Advisory-for-Unauthenticated-Remote-Buffer-Overflow-Attack-in-PPPD-on-WAC510-PSV-2020-0136
https://lists.debian.org/debian-lts-announce/2020/02/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UNJNHWOO4XF73M2W56ILZUY4JQG3JXIR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOFDAIOWSWPG732ASYUZNINMXDHY4APE/
https://security.gentoo.org/glsa/202003-19
https://security.netapp.com/advisory/ntap-20200313-0004/
https://us-cert.cisa.gov/ics/advisories/icsa-20-224-04
https://usn.ubuntu.com/4288-1/
https://usn.ubuntu.com/4288-2/
https://www.debian.org/security/2020/dsa-4632
https://www.kb.cert.org/vuls/id/782301
https://www.synology.com/security/advisory/Synology_SA_20_02
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00006.html
http://packetstormsecurity.com/files/156662/pppd-2.4.8-Buffer-Overflow.html
http://packetstormsecurity.com/files/156802/pppd-2.4.8-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2020/Mar/6
https://access.redhat.com/errata/RHSA-2020:0630
https://access.redhat.com/errata/RHSA-2020:0631
https://access.redhat.com/errata/RHSA-2020:0633
https://access.redhat.com/errata/RHSA-2020:0634
https://cert-portal.siemens.com/productcert/pdf/ssa-809841.pdf
https://github.com/paulusmack/ppp/commit/8d7970b8f3db727fe798b65f3377fe6787575426
https://kb.netgear.com/000061806/Security-Advisory-for-Unauthenticated-Remote-Buffer-Overflow-Attack-in-PPPD-on-WAC510-PSV-2020-0136
https://lists.debian.org/debian-lts-announce/2020/02/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UNJNHWOO4XF73M2W56ILZUY4JQG3JXIR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOFDAIOWSWPG732ASYUZNINMXDHY4APE/
https://security.gentoo.org/glsa/202003-19
https://security.netapp.com/advisory/ntap-20200313-0004/
https://us-cert.cisa.gov/ics/advisories/icsa-20-224-04
https://usn.ubuntu.com/4288-1/
https://usn.ubuntu.com/4288-2/
https://www.debian.org/security/2020/dsa-4632
https://www.kb.cert.org/vuls/id/782301
https://www.synology.com/security/advisory/Synology_SA_20_02
Products affected by CVE-2020-8597
Point-To-Point Protocol Project
»
Point-To-Point Protocol
»
Version:
2.4.2
cpe:2.3:a:point-to-point_protocol_project:point-to-point_protocol:2.4.2
Point-To-Point Protocol Project
»
Point-To-Point Protocol
»
Version:
2.4.3
cpe:2.3:a:point-to-point_protocol_project:point-to-point_protocol:2.4.3
Point-To-Point Protocol Project
»
Point-To-Point Protocol
»
Version:
2.4.4
cpe:2.3:a:point-to-point_protocol_project:point-to-point_protocol:2.4.4
Point-To-Point Protocol Project
»
Point-To-Point Protocol
»
Version:
2.4.5
cpe:2.3:a:point-to-point_protocol_project:point-to-point_protocol:2.4.5
Point-To-Point Protocol Project
»
Point-To-Point Protocol
»
Version:
2.4.6
cpe:2.3:a:point-to-point_protocol_project:point-to-point_protocol:2.4.6
Point-To-Point Protocol Project
»
Point-To-Point Protocol
»
Version:
2.4.7
cpe:2.3:a:point-to-point_protocol_project:point-to-point_protocol:2.4.7
Point-To-Point Protocol Project
»
Point-To-Point Protocol
»
Version:
2.4.8
cpe:2.3:a:point-to-point_protocol_project:point-to-point_protocol:2.4.8
Wago
»
Pfc100
»
Version:
N/A
cpe:2.3:h:wago:pfc100:-
Wago
»
Pfc200
»
Version:
N/A
cpe:2.3:h:wago:pfc200:-
Canonical
»
Ubuntu Linux
»
Version:
12.04
cpe:2.3:o:canonical:ubuntu_linux:12.04
Canonical
»
Ubuntu Linux
»
Version:
14.04
cpe:2.3:o:canonical:ubuntu_linux:14.04
Canonical
»
Ubuntu Linux
»
Version:
16.04
cpe:2.3:o:canonical:ubuntu_linux:16.04
Canonical
»
Ubuntu Linux
»
Version:
18.04
cpe:2.3:o:canonical:ubuntu_linux:18.04
Canonical
»
Ubuntu Linux
»
Version:
19.04
cpe:2.3:o:canonical:ubuntu_linux:19.04
Debian
»
Debian Linux
»
Version:
10.0
cpe:2.3:o:debian:debian_linux:10.0
Debian
»
Debian Linux
»
Version:
9.0
cpe:2.3:o:debian:debian_linux:9.0
Wago
»
Pfc Firmware
»
Version:
03.00.35(12)
cpe:2.3:o:wago:pfc_firmware:03.00.35(12)
Wago
»
Pfc Firmware
»
Version:
03.00.39(12.1)
cpe:2.3:o:wago:pfc_firmware:03.00.39(12.1)
Wago
»
Pfc Firmware
»
Version:
03.03.10(15)
cpe:2.3:o:wago:pfc_firmware:03.03.10(15)
Wago
»
Pfc Firmware
»
Version:
03.03.11(15.1)
cpe:2.3:o:wago:pfc_firmware:03.03.11(15.1)
Wago
»
Pfc Firmware
»
Version:
03.04.04(14)
cpe:2.3:o:wago:pfc_firmware:03.04.04(14)
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved