First published: Tue Oct 06 2020(Updated: )
The PPP implementation of MPD before 5.9 allows a remote attacker who can send specifically crafted PPP authentication message to cause the daemon to read beyond allocated memory buffer, which would result in a denial of service condition.
Credit: secteam@freebsd.org secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mpd Project Mpd | <5.9 | |
Stormshield Stormshield Network Security | >=4.0.0<4.3.17 | |
Stormshield Stormshield Network Security | =4.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7466 is a vulnerability in the PPP implementation of MPD before version 5.9.
The severity of CVE-2020-7466 is rated as high, with a severity value of 7.5.
CVE-2020-7466 affects the software Mpd Project Mpd before version 5.9 and Stormshield Network Security before version 4.3.17 or version 4.4.0 exactly.
A remote attacker can exploit CVE-2020-7466 by sending specifically crafted PPP authentication messages to the vulnerable daemon.
Yes, you can find more information about CVE-2020-7466 at the following references: [Link1](https://sourceforge.net/p/mpd/bugs/69/) and [Link2](https://sourceforge.net/p/mpd/svn/2374/).