Feb. 14, 2022, 10:15 p.m. |

National Vulnerability Database web.nvd.nist.gov

The rad_packet_recv function in opt/src/accel-pppd/radius/packet.c suffers from a buffer overflow vulnerability, whereby user input len is copied into a fixed buffer &attr->val.integer without any bound checks. If the client connects to the server and sends a large radius packet, a buffer overflow vulnerability will be triggered.

accel cve ppp

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Penetration Tester

@ Resillion | Bengaluru, India

Senior Backend Software Engineer (Java) - Privacy Engineering (Open to remote across ANZ)

@ Canva | Sydney, Australia

(Senior) Information Security Professional (w/m/d)

@ IONOS | Deutschland - Remote

Information Security (Incident Response) Intern

@ Eurofins | Katowice, Poland

Game Penetration Tester

@ Magic Media | Belgrade, Vojvodina, Serbia - Remote