cve/2023/CVE-2023-22325.md

18 lines
894 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-22325](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22325)
![](https://img.shields.io/static/v1?label=Product&message=SoftEther%20VPN&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%204.41-9782-beta%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20('Infinite%20Loop')&color=brighgreen)
### Description
A denial of service vulnerability exists in the DCRegister DDNS_RPC_MAX_RECV_SIZE functionality of SoftEther VPN 4.41-9782-beta, 5.01.9674 and 5.02. A specially crafted network packet can lead to denial of service. An attacker can perform a man-in-the-middle attack to trigger this vulnerability.
### POC
#### Reference
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1736
#### Github
No PoCs found on GitHub currently.