<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CVE-2020-8597 is it applicable for Palo alto ? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/cve-2020-8597-is-it-applicable-for-palo-alto/m-p/317174#M81526</link>
    <description>&lt;P&gt;&lt;SPAN&gt;With the release of PAN-OS 9.0.1 Palo Alto Networks has a new Security Advisory site. &amp;nbsp;Please see&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://securityadvisories.paloaltonetworks.com/" target="_self" rel="nofollow noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer"&gt;https://securityadvisories.paloaltonetworks.com&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;for details.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It does not appear that Palo Alto Networks devices are vulnerable to this specific advisory.&lt;/P&gt;
&lt;P&gt;I searched that site and&amp;nbsp;did not find it.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would recommend that you search that site for all CVE's or visit:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/PSIRT-Articles/tkb-p/PSIRT_Articles" target="_blank"&gt;https://live.paloaltonetworks.com/t5/PSIRT-Articles/tkb-p/PSIRT_Articles&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 18 Mar 2020 23:17:21 GMT</pubDate>
    <dc:creator>jdelio</dc:creator>
    <dc:date>2020-03-18T23:17:21Z</dc:date>
    <item>
      <title>CVE-2020-8597 is it applicable for Palo alto ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cve-2020-8597-is-it-applicable-for-palo-alto/m-p/316465#M81389</link>
      <description>&lt;P&gt;&lt;STRONG&gt;We have received a Critical Security Advisory related to Buffer Overflow Vulnerability in Point-to-Point Protocol Daemon (pppd).&lt;BR /&gt;&amp;nbsp;is applicable to our PaloAlto and Panorama Firewall devices.?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Risk Advisory No CVE-2020-8597&lt;BR /&gt;Advisory Name Buffer Overflow Vulnerability in Point-to-Point Protocol Daemon (pppd)&lt;BR /&gt;Severity Critical&lt;BR /&gt;Action Required Immediate&lt;BR /&gt;Summary CVE-2020-8597&lt;BR /&gt;CVE A new buffer overflow vulnerability has been discovered in pppd (Point to Point Protocol Daemon) versions 2.4.2 through 2.4.8. An unauthenticated remote attacker could cause memory corruption in the pppd process, which may allow for arbitrary code execution. System administrators are encouraged to update pppd software with the latest available patches in order to prevent vulnerability exploitation.&lt;BR /&gt;Affected Products Buffer Overflow Vulnerability in Point-to-Point Protocol Daemon (pppd) versions 2.4.2 through 2.4.8 are vulnerable&lt;BR /&gt;to CVE-2020-8597. This package is included in software products from different vendors. Please find below the list of confirmed affected vendors:&lt;BR /&gt;• Cisco&lt;BR /&gt;• Debian GNU/Linux&lt;BR /&gt;• Fedora Project&lt;BR /&gt;• NetBSD&lt;BR /&gt;• OpenWRT&lt;BR /&gt;• Red Hat&lt;BR /&gt;• Sierra Wireless&lt;BR /&gt;• SUSE Linux&lt;BR /&gt;• Synology&lt;BR /&gt;• TP-LINK&lt;BR /&gt;• Ubuntu&lt;BR /&gt;Recommendations It is recommended to update the pppd package with the latest available patches provided by each vendor. An authenticated attacker may still be able to exploit the vulnerability even if EAP is not enabled by sending unsolicited EAP packets to trigger&lt;BR /&gt;the buffer overflow. If the package has been compiled from source, the latest software can be obtained&lt;BR /&gt;from the pppd repository in Github:&lt;BR /&gt;• &lt;A href="https://github.com/paulusmack/ppp" target="_blank" rel="noopener"&gt;https://github.com/paulusmack/ppp&lt;/A&gt;&lt;BR /&gt;• &lt;A href="https://github.com/paulusmack/ppp/commit/8d7970b8f3db727fe798b65f33" target="_blank" rel="noopener"&gt;https://github.com/paulusmack/ppp/commit/8d7970b8f3db727fe798b65f33&lt;/A&gt;&lt;BR /&gt;77fe6787575426&lt;BR /&gt;For those using the lwIP (lightweight IP) package compiled from source with EAP&lt;BR /&gt;enabled at compile time, the latest version is also available on Github:&lt;BR /&gt;• &lt;A href="http://git.savannah.nongnu.org/cgit/lwip.git" target="_blank" rel="noopener"&gt;http://git.savannah.nongnu.org/cgit/lwip.git&lt;/A&gt;&lt;BR /&gt;• &lt;A href="http://git.savannah.nongnu.org/cgit/lwip.git/commit/" target="_blank" rel="noopener"&gt;http://git.savannah.nongnu.org/cgit/lwip.git/commit/&lt;/A&gt;?&lt;BR /&gt;id=2ee3cbe69c6d2805e64e7cac2a1c1706e49ffd86&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Regards,&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 15 Mar 2020 06:47:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cve-2020-8597-is-it-applicable-for-palo-alto/m-p/316465#M81389</guid>
      <dc:creator>CyberEye</dc:creator>
      <dc:date>2020-03-15T06:47:03Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2020-8597 is it applicable for Palo alto ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cve-2020-8597-is-it-applicable-for-palo-alto/m-p/317174#M81526</link>
      <description>&lt;P&gt;&lt;SPAN&gt;With the release of PAN-OS 9.0.1 Palo Alto Networks has a new Security Advisory site. &amp;nbsp;Please see&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://securityadvisories.paloaltonetworks.com/" target="_self" rel="nofollow noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer"&gt;https://securityadvisories.paloaltonetworks.com&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;for details.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It does not appear that Palo Alto Networks devices are vulnerable to this specific advisory.&lt;/P&gt;
&lt;P&gt;I searched that site and&amp;nbsp;did not find it.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would recommend that you search that site for all CVE's or visit:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/PSIRT-Articles/tkb-p/PSIRT_Articles" target="_blank"&gt;https://live.paloaltonetworks.com/t5/PSIRT-Articles/tkb-p/PSIRT_Articles&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2020 23:17:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cve-2020-8597-is-it-applicable-for-palo-alto/m-p/317174#M81526</guid>
      <dc:creator>jdelio</dc:creator>
      <dc:date>2020-03-18T23:17:21Z</dc:date>
    </item>
  </channel>
</rss>

