pppdump array index OOB in dumpppp
CVE-2022-4603 Published on December 18, 2022
ppp pppdump pppdump.c dumpppp array index
A vulnerability classified as problematic has been found in ppp. Affected is the function dumpppp of the file pppdump/pppdump.c of the component pppdump. The manipulation of the argument spkt.buf/rpkt.buf leads to improper validation of array index. The real existence of this vulnerability is still doubted at the moment. The name of the patch is a75fb7b198eed50d769c80c36629f38346882cbf. It is recommended to apply a patch to fix this issue. VDB-216198 is the identifier assigned to this vulnerability. NOTE: pppdump is not used in normal process of setting up a PPP connection, is not installed setuid-root, and is not invoked automatically in any scenario.
Vulnerability Analysis
Weakness Type
What is a Buffer Overflow Vulnerability?
The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
CVE-2022-4603 has been classified to as a Buffer Overflow vulnerability or weakness.
Products Associated with CVE-2022-4603
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2022-4603 are published in Samba Ppp:
Affected Versions
unspecified ppp Version n/a is affected by CVE-2022-4603Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.