• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Latest Cybersecurity News Linux security

Remote code execution in PPP Daemon (CVE-2020-8597) could become the gateway for attackers

William Marshal Posted On March 6, 2020
1



CVE-2020-8597 vulnerability

A new remote code execution vulnerability has been identified in the PPP daemon (pppd) software that comes in most of the Linux operating systems and also in other networking devices that works on the basis of this PPPd software. The US-CERT had announced this vulnerability today through their security advisory. Point-to-Point Protocol (PPP) facilitates the communication and transferring of data among the internet links like modems, broadband connections and VPNs. This vulnerability is tracked as CVE-2020-8597 and has been given a score of 9.8, showing how critical is the flaw.

First discovered by Ilja Sprundel, the issue is because of a stack buffer overflow vulnerability in PPP demon software. The vulnerability exists because of a logical error in the Extensible Authentication Protocol (EAP) packet parser in the software. 

How can attackers exploit this vulnerability?

Attackers just need to send unsolicited malformed EAP packet to the vulnerable PPP agent or the server. Also, because of the escalated privileges for the pppd software, and combines with the kernel drivers, this vulnerability has the potential to let attackers take root-level controls to the system. 

Furthermore, the vulnerability doesn’t validate the size of input before processing the data that is being supplied to it, an arbitrary data can be copied into memory and result in memory corruption, thus opening doors to unwanted codes being executed. The logic of eap parsing code is where the vulnerability exists, which is requested by the network input handler.

Though users disable the EAP or the same hasn’t been negotiated by a passphrase from a peer, attackers can still execute the attack by sending unsolicited EAP packer and initiate the buffer overflow.

Vulnerable operating systems and applications

According to Sprundel, PPP Daemon’s versions from 2.4.2 to 2.4.8 is affected by this remote code execution vulnerability.

The affected OSs are Debian, SUSE Linux, Ubuntu, Fedora, Red Hat Enterprise Linux, and NetBSD. Also, the affected applications are, TP-Link products, OpenWRT Embedded OS, Synology products, and Cisco CallManager. Users who are affected by this vulnerability are requested to update their operating system and applications with the right seurity patches before the attackers sneak-in. 

Subscribe to ‘The Cybersecurity Times’, for daily alerts on cyber events. You can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.

Share the article with your friends


CVE-2020-8597CVE-2020-8597 vulnerabilityPPP Daemon vulnerability


Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

1 Comment

online story books
March 10, 2020 at 9:26 am
Reply

Thanks fοr your mardveloᥙs posting! I definitely enjoyed reading it, you can be a
ցreat author.I will make certain to bookmarқ your blog
and wiⅼl often come back later in lіfe.
I want to emcourage continue your great work, have a nice evening!


Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search