From b367bb065d5dd41dcf8a2f6e7f265a971940df62 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 9 Sep 2020 23:01:44 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/15xxx/CVE-2020-15173.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/2020/15xxx/CVE-2020-15173.json b/2020/15xxx/CVE-2020-15173.json index bd7eacc5a0a..f70da6d1530 100644 --- a/2020/15xxx/CVE-2020-15173.json +++ b/2020/15xxx/CVE-2020-15173.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "In ACCEL-PPP (an implementation of PPTP/PPPoE/L2TP/SSTP), there is a buffer overflow when receiving an l2tp control packet ith an AVP which type is a string and no hidden flags, length set to less than 6.\n\nIf your application is used in open networks or there are untrusted nodes in the network it is highly recommended to apply the patch.\n\nThe problem was patched with commit 2324bcd5ba12cf28f47357a8f03cd41b7c04c52b\n\nAs a workaround changes of commit 2324bcd5ba12cf28f47357a8f03cd41b7c04c52b can be applied to older versions." + "value": "In ACCEL-PPP (an implementation of PPTP/PPPoE/L2TP/SSTP), there is a buffer overflow when receiving an l2tp control packet ith an AVP which type is a string and no hidden flags, length set to less than 6. If your application is used in open networks or there are untrusted nodes in the network it is highly recommended to apply the patch. The problem was patched with commit 2324bcd5ba12cf28f47357a8f03cd41b7c04c52b As a workaround changes of commit 2324bcd5ba12cf28f47357a8f03cd41b7c04c52b can be applied to older versions." } ] },