Variable underflow exists in accel-ppp radius/packet.c when receiving a RADIUS vendor-specific attribute with length field is less than 2. It has an impact only when the attacker controls the RADIUS server, which can lead to arbitrary code execution.
[
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 3593.0,
"function_hash": "218305480135744760965322474118285676607"
},
"signature_version": "v1",
"id": "CVE-2020-28194-28ac3858",
"target": {
"function": "rad_packet_recv",
"file": "accel-pppd/radius/packet.c"
},
"source": "https://github.com/accel-ppp/accel-ppp/commit/e9d369aa0054312b7633e964e9f7eb323f1f3d69"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"53169831652962479236524189091079696734",
"193894202797788791053606579230416303418",
"56156999255468833464194175077938322916",
"108214281405374322627184477935854642973"
],
"threshold": 0.9
},
"signature_version": "v1",
"id": "CVE-2020-28194-2fff89dc",
"target": {
"file": "accel-pppd/radius/packet.c"
},
"source": "https://github.com/accel-ppp/accel-ppp/commit/e9d369aa0054312b7633e964e9f7eb323f1f3d69"
}
]