[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2014-3158Date: (C)2014-12-01   (M)2023-12-22


Integer overflow in the getword function in options.c in pppd in Paul's PPP Package (ppp) before 2.4.7 allows attackers to "access privileged options" via a long word in an options file, which triggers a heap-based buffer overflow that "[corrupts] security-relevant variables."

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.5
Exploit Score: 10.0
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
DSA-3079
FEDORA-2014-9412
MDVSA-2015:135
USN-2429-1
http://marc.info/?l=linux-ppp&m=140764978420764
http://advisories.mageia.org/MGASA-2014-0368.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
https://bugzilla.redhat.com/show_bug.cgi?id=1128748
https://github.com/paulusmack/ppp/commit/7658e8257183f062dc01f87969c140707c7e52cb

CWE    1
CWE-119
OVAL    6
oval:org.secpod.oval:def:702319
oval:org.secpod.oval:def:107367
oval:org.secpod.oval:def:601845
oval:org.secpod.oval:def:52357
...

© SecPod Technologies