[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2006-4304Date: (C)2006-08-23   (M)2023-12-22


Buffer overflow in the sppp driver in FreeBSD 4.11 through 6.1, NetBSD 2.0 through 4.0 beta before 20060823, and OpenBSD 3.8 and 3.9 before 20060902 allows remote attackers to cause a denial of service (panic), obtain sensitive information, and possibly execute arbitrary code via crafted Link Control Protocol (LCP) packets with an option length that exceeds the overall length, which triggers the overflow in (1) pppoe and (2) ippp. NOTE: this issue was originally incorrectly reported for the ppp driver.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 10.0
Exploit Score: 10.0
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECTRACK-1016745
BID-19684
SECUNIA-21587
SECUNIA-21731
FreeBSD-SA-06:08
NetBSD-SA2006-019
http://www.openbsd.org/errata38.html#sppp
http://www.openbsd.org/errata.html#sppp
http://security.FreeBSD.org/patches/SA-06:18/ppp4x.patch
sppp4-lcp-bo(28562)

CPE    11
cpe:/o:netbsd:netbsd:2.0
cpe:/o:netbsd:netbsd:3.0
cpe:/o:netbsd:netbsd:4.0
cpe:/o:openbsd:openbsd:3.9
...

© SecPod Technologies