March 16, 2022, 3:15 p.m. |

National Vulnerability Database web.nvd.nist.gov

The telnet_input_char function in opt/src/accel-pppd/cli/telnet.c suffers from a memory corruption vulnerability, whereby user input cmdline_len is copied into a fixed buffer b->buf without any bound checks. If the server connects with a malicious client, crafted client requests can remotely trigger this vulnerability.

accel cve ppp

Information Security Engineers

@ D. E. Shaw Research | New York City

Information Systems Security Engineer (ISSE)

@ Wyetech | Ft. Belvoir, Virginia

Security Consultant, FedRAMP Assessment | Remote US

@ Coalfire | United States

PAI/OSINT Administration Policy SME

@ Accenture Federal Services | Washington, DC

Field CISO

@ Lacework | United States

Risk Advisory Forensic Technology Services Senior

@ KPMG India | Mumbai, Maharashtra, India