Search CVE reports
1 – 10 of 15 results
CVE-2024-25763
Medium prioritySome fixes available 2 of 3
openNDS 10.2.0 is vulnerable to Use-After-Free via /openNDS/src/auth.c.
1 affected package
opennds
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
opennds | Fixed | Not in release | Not in release | Not in release | Not in release |
CVE-2023-38323
Medium priorityAn issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the status path script entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.
1 affected package
opennds
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
opennds | Not affected | Not in release | Not in release | Ignored | Ignored |
CVE-2023-38319
Medium priorityAn issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the FAS key entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.
1 affected package
opennds
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
opennds | Not affected | Not in release | Not in release | Ignored | Ignored |
CVE-2023-38318
Medium priorityAn issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the gateway FQDN entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.
1 affected package
opennds
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
opennds | Not affected | Not in release | Not in release | Ignored | Ignored |
CVE-2023-38317
Medium priorityAn issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the network interface name entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.
1 affected package
opennds
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
opennds | Not affected | Not in release | Not in release | Ignored | Ignored |
CVE-2023-38321
Medium priorityOpenNDS, as used in Sierra Wireless ALEOS before 4.17.0.12 and other products, allows remote attackers to cause a denial of service (NULL pointer dereference, daemon crash, and Captive Portal outage) via a GET request to...
1 affected package
opennds
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
opennds | Not affected | Not in release | Not in release | Ignored | Ignored |
CVE-2023-41102
Medium priorityAn issue was discovered in the captive portal in OpenNDS before version 10.1.3. It has multiple memory leaks due to not freeing up allocated memory. This may lead to a Denial-of-Service condition due to the consumption of all...
1 affected package
opennds
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
opennds | Not affected | Not in release | Not in release | Ignored | Ignored |
CVE-2023-41101
Medium priorityAn issue was discovered in the captive portal in OpenNDS before version 10.1.3. get_query in http_microhttpd.c does not validate the length of the query string of GET requests. This leads to a stack-based buffer overflow in...
1 affected package
opennds
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
opennds | Not affected | Not in release | Not in release | Ignored | Ignored |
CVE-2023-38324
Medium priorityAn issue was discovered in OpenNDS before 10.1.2. It allows users to skip the splash page sequence (and directly authenticate) when it is using the default FAS key and OpenNDS is configured as FAS. Affected OpenNDS Captive Portal...
1 affected package
opennds
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
opennds | Not affected | Not in release | Not in release | Not in release | Not in release |
CVE-2023-38322
Medium priorityAn issue was discovered in OpenNDS Captive Portal before version 10.1.2. It has a do_binauth NULL pointer dereference that be triggered with a crafted GET HTTP request with a missing User-Agent HTTP header. Triggering this issue...
1 affected package
opennds
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
opennds | Not affected | Not in release | Not in release | Ignored | Ignored |