A denial of service vulnerability exists in the DCRegister DDNS_RPC_MAX_RECV_SIZE functionality of SoftEther VPN 4.41-9782-beta, 5.01.9674 and 5.02. A specially crafted network packet can lead to denial of service. An attacker can perform a man-in-the-middle attack to trigger this vulnerability.
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Link | Tags |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1736 | third party advisory exploit |
https://www.softether.org/9-about/News/904-SEVPN202301 | patch vendor advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1736 |