First published: Fri Nov 17 2023(Updated: )
An issue was discovered in OpenNDS Captive Portal before version 10.1.2. It has a do_binauth NULL pointer dereference that be triggered with a crafted GET HTTP request with a missing User-Agent HTTP header. Triggering this issue results in crashing OpenNDS (a Denial-of-Service condition). The issue occurs when the client is about to be authenticated, and can be triggered only when the BinAuth option is set. Affected OpenNDS Captive Portal before version 10.1.2 fixed in OpenWrt master, OpenWrt 23.05 and OpenWrt 22.03 on 28. August 2023 by updating OpenNDS to version 10.1.3.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenNDS Captive Portal | <10.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38322 is a vulnerability in OpenNDS Captive Portal before version 10.1.2 that allows a NULL pointer dereference, leading to a Denial-of-Service condition.
CVE-2023-38322 has a severity rating of 7.5 (high).
CVE-2023-38322 can be triggered with a crafted GET HTTP request with a missing User-Agent HTTP header.
The affected software version of CVE-2023-38322 is OpenNDS Captive Portal up to and excluding version 10.1.2.
Yes, updating to OpenNDS Captive Portal version 10.1.2 or later fixes CVE-2023-38322.