Published on: 06 March 2020
A vulnerability was found in Extensible Authentication Protocol (EAP) packet processing in eap_request and eap_response of the pppd (Point-to-Point Protocol Daemon). An unauthenticated remote attacker could exploit the vulnerability by sending specially crafted packets to an affected system.
A successful attack could lead to arbitrary code execution on an affected system.
Some product vendors have fixed or have planned to fix the vulnerability in their Linux/Unix systems as listed below. The list is not exhaustive and it is recommended to consult the product vendors to confirm the availability of patches. System administrators should apply the patches or follow the recommendations provided by the product vendors to mitigate the risk.
https://www.us-cert.gov/ncas/current-activity/2020/03/05/point-point-protocol-daemon-vulnerability
https://www.kb.cert.org/vuls/id/782301/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8597