{"id":"CVE-2020-8597","details":"eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions.","modified":"2026-03-20T11:37:59.419618Z","published":"2020-02-03T23:15:11.387Z","related":["ALSA-2020:0633","MGASA-2020-0139","SUSE-SU-2020:0489-1","SUSE-SU-2020:0490-1","SUSE-SU-2020:14292-1","openSUSE-SU-2020:0286-1","openSUSE-SU-2024:11191-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UNJNHWOO4XF73M2W56ILZUY4JQG3JXIR/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOFDAIOWSWPG732ASYUZNINMXDHY4APE/"},{"type":"ADVISORY","url":"https://www.kb.cert.org/vuls/id/782301"},{"type":"ADVISORY","url":"https://www.synology.com/security/advisory/Synology_SA_20_02"},{"type":"ADVISORY","url":"https://kb.netgear.com/000061806/Security-Advisory-for-Unauthenticated-Remote-Buffer-Overflow-Attack-in-PPPD-on-WAC510-PSV-2020-0136"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20200313-0004/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4632"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0630"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00005.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202003-19"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00006.html"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/156802/pppd-2.4.8-Buffer-Overflow.html"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2020/Mar/6"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0631"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0634"},{"type":"ADVISORY","url":"https://us-cert.cisa.gov/ics/advisories/icsa-20-224-04"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4288-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4288-2/"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/156662/pppd-2.4.8-Buffer-Overflow.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0633"},{"type":"ADVISORY","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-809841.pdf"},{"type":"FIX","url":"https://github.com/paulusmack/ppp/commit/8d7970b8f3db727fe798b65f3377fe6787575426"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/paulusmack/ppp","events":[{"introduced":"47e865d8d20259857f96a573c8a3f18b27925d7e"},{"last_affected":"78cd384ce0f48bb5edb84e4fe9a574eab4a4ad14"}],"database_specific":{"versions":[{"introduced":"2.4.2"},{"last_affected":"2.4.8"}]}},{"type":"GIT","repo":"https://github.com/ppp-project/ppp","events":[{"introduced":"0"},{"fixed":"8d7970b8f3db727fe798b65f3377fe6787575426"}]}],"versions":["ppp-2.0.4","ppp-2.1.1","ppp-2.1.2","ppp-2.2","ppp-2.3.0","ppp-2.3.1","ppp-2.3.10","ppp-2.3.11","ppp-2.3.2","ppp-2.3.3","ppp-2.3.4","ppp-2.3.5","ppp-2.3.6","ppp-2.3.7","ppp-2.3.8","ppp-2.3.9","ppp-2.4.0","ppp-2.4.1","ppp-2.4.2","ppp-2.4.3","ppp-2.4.4","ppp-2.4.5","ppp-2.4.6","ppp-2.4.7","ppp-2.4.8","v2.0.4","v2.1.1","v2.1.2","v2.2","v2.3.0","v2.3.1","v2.3.10","v2.3.11","v2.3.2","v2.3.3","v2.3.4","v2.3.5","v2.3.6","v2.3.7","v2.3.8","v2.3.9","v2.4.0","v2.4.1","v2.4.2","v2.4.3","v2.4.4","v2.4.5","v2.4.6","v2.4.7","v2.4.8"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"03.04.10\\(16\\)"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.04"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-8597.json","vanir_signatures":[{"target":{"file":"pppd/eap.c"},"signature_type":"Line","id":"CVE-2020-8597-c6718d2e","source":"https://github.com/ppp-project/ppp/commit/8d7970b8f3db727fe798b65f3377fe6787575426","digest":{"line_hashes":["8699045395222809821525703277737619786","292496779373962596035831255329665227367","48074617099796428185979187632482703117","71461733246980172279550421003972967472","248727923961049345348254177514247989885","292496779373962596035831255329665227367","48074617099796428185979187632482703117","71461733246980172279550421003972967472"],"threshold":0.9},"deprecated":false,"signature_version":"v1"}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}