Lucene search

K
gentooGentoo FoundationGLSA-201701-50
HistoryJan 23, 2017 - 12:00 a.m.

PPP: Buffer overflow

2017-01-2300:00:00
Gentoo Foundation
security.gentoo.org
39

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.068 Low

EPSS

Percentile

93.8%

Background

PPP is a Unix implementation of the Point-to-Point Protocol

Description

A buffer overflow was discovered in the rc_mksid function in plugins/radius/util.c in PPP when the PID for pppd is greater than 65535.

Impact

A remote attacker could cause a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All PPP users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-dialup/ppp-2.4.7-r3"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-dialup/ppp< 2.4.7-r3UNKNOWN

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.068 Low

EPSS

Percentile

93.8%