Lucene search

K
mageiaGentoo FoundationMGASA-2015-0173
HistoryMay 01, 2015 - 12:57 a.m.

Updated ppp packages fix CVE-2015-3310

2015-05-0100:57:25
Gentoo Foundation
advisories.mageia.org
5

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.068 Low

EPSS

Percentile

93.8%

Updated ppp packages fix security vulnerability: Emanuele Rocca discovered that ppp was subject to a buffer overflow when communicating with a RADIUS server. This would allow unauthenticated users to cause a denial-of-service by crashing the daemon (CVE-2015-3310).

OSVersionArchitecturePackageVersionFilename
Mageia4noarchppp< 2.4.5-17.2ppp-2.4.5-17.2.mga4

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.068 Low

EPSS

Percentile

93.8%