
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability (CVE-2022-4603) was discovered in the pppdump component of the Point-to-Point Protocol (PPP) package. The issue affects the dumpppp function in pppdump/pppdump.c and involves improper validation of array index when accessing the packet buffer (PPP Commit, Fedora Update).
The vulnerability stems from data being written to spkt.buf and rpkt.buf without proper validation of the array index. When manipulating the spkt.buf/rpkt.buf argument, a potential buffer overflow condition could occur. The fix involves checking the array index (pkt->cnt) before storing bytes or incrementing the count, which also prevents potential signed integer overflow on the increment of pkt->cnt (PPP Commit).
The vulnerability could lead to buffer overflow conditions, potentially resulting in application crashes or memory corruption. However, the impact is limited since pppdump is not used in the normal process of setting up a PPP connection, is not installed setuid-root, and is not invoked automatically in any known scenarios (PPP Commit).
The issue has been fixed in updated versions of the PPP package. For example, Fedora 38 has released version ppp-2.4.9-10.fc38 which includes the fix. Users are advised to upgrade to the patched version using their system's package manager (Fedora Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."