[GLSA-200411-01] ppp: Remote denial of service vulnerability
2004-11-02T00:00:00
ID GENTOO_GLSA-200411-01.NASL Type nessus Reporter Tenable Modified 2004-11-02T00:00:00
Description
The remote host is affected by the vulnerability described in GLSA-200411-01 (ppp: Remote denial of service vulnerability)
The pppd server improperly verifies header fields, making it vulnerable to denial of service attacks.
Impact
An attacker can cause the pppd server to access memory that it isn't allowed to, causing the server to crash. No code execution is possible with this vulnerability, because no data is getting copied.
Workaround
There is no known workaround at this time.
# @DEPRECATED@
#
# This script has been deprecated and is no longer used as the
# Gentoo advisory says the issue has no security impact.
#
# Disabled on 2011/05/27.
#
# This script was automatically generated from
# http://www.gentoo.org/security/en/glsa/glsa-200411-01.xml
# It is released under the Nessus Script Licence.
# The messages are release under the Creative Commons - Attribution /
# Share Alike license. See http://creativecommons.org/licenses/by-sa/2.0/
#
# Avisory is copyright 2001-2004 Gentoo Foundation, Inc.
# GLSA2nasl Convertor is copyright 2004 Michel Arboi
if (! defined_func('bn_random')) exit(0);
include('compat.inc');
if (description)
{
script_id(15589);
script_version("$Revision: 1.5 $");
script_cve_id("CVE-2004-1002");
script_xref(name: "GLSA", value: "200411-01");
script_set_attribute(attribute:'synopsis', value: 'The remote host is missing the GLSA-200411-01 security update.');
script_set_attribute(attribute:'description', value: 'The remote host is affected by the vulnerability described in
GLSA-200411-01 (ppp: Remote denial of service vulnerability)
The pppd server improperly verifies header fields, making it vulnerable to
denial of service attacks.
Impact
An attacker can cause the pppd server to access memory that it isn\'t
allowed to, causing the server to crash. No code execution is possible with
this vulnerability, because no data is getting copied.
Workaround
There is no known workaround at this time.');
script_set_attribute(attribute: 'see_also', value: 'http://www.securityfocus.com/archive/1/379450');
script_set_attribute(attribute: 'see_also', value: 'http://www.gentoo.org/security/en/glsa/glsa-200411-01.xml');
script_set_attribute(attribute:'solution', value: ' All ppp users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-dialup/ppp-2.4.2-r7"');
script_set_attribute(attribute: 'cvss_vector', value: 'CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P');
script_set_attribute(attribute:"plugin_publication_date", value: "2004/11/02");
script_end_attributes();
script_copyright(english: "This script is Copyright (C) 2004-2010 Tenable Network Security, Inc.");
script_name(english: "[GLSA-200411-01] ppp: Remote denial of service vulnerability");
script_category(ACT_GATHER_INFO);
script_family(english: "Gentoo Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys('Host/Gentoo/qpkg-list');
script_summary(english: 'ppp: Remote denial of service vulnerability');
exit(0);
}
exit(0); # Gentoo now claims it's not an issue
include('qpkg.inc');
if (qpkg_check(package: "net-dialup/ppp", unaffected: make_list("ge 2.4.2-r7"), vulnerable: make_list("lt 2.4.2-r7")
)) { security_warning(0); exit(0); }
{"published": "2004-11-02T00:00:00", "id": "GENTOO_GLSA-200411-01.NASL", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "enchantments": {"score": {"value": 5.4, "vector": "NONE", "modified": "2016-09-26T17:26:13", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2004-1002"]}, {"type": "osvdb", "idList": ["OSVDB:11178"]}, {"type": "ubuntu", "idList": ["USN-12-1"]}], "modified": "2016-09-26T17:26:13", "rev": 2}, "vulnersScore": 5.4}, "description": "The remote host is affected by the vulnerability described in GLSA-200411-01 (ppp: Remote denial of service vulnerability)\n\n The pppd server improperly verifies header fields, making it vulnerable to denial of service attacks.\n Impact\n\n An attacker can cause the pppd server to access memory that it isn't allowed to, causing the server to crash. No code execution is possible with this vulnerability, because no data is getting copied.\n Workaround\n\n There is no known workaround at this time.", "type": "nessus", "pluginID": "15589", "lastseen": "2016-09-26T17:26:13", "edition": 1, "title": "[GLSA-200411-01] ppp: Remote denial of service vulnerability", "href": "https://www.tenable.com/plugins/index.php?view=single&id=15589", "modified": "2004-11-02T00:00:00", "bulletinFamily": "scanner", "viewCount": 0, "cvelist": ["CVE-2004-1002"], "references": ["http://www.gentoo.org/security/en/glsa/glsa-200411-01.xml", "http://www.securityfocus.com/archive/1/379450"], "naslFamily": "Gentoo Local Security Checks", "reporter": "Tenable", "sourceData": "# @DEPRECATED@\n#\n# This script has been deprecated and is no longer used as the\n# Gentoo advisory says the issue has no security impact.\n#\n# Disabled on 2011/05/27. \n#\n# This script was automatically generated from \n# http://www.gentoo.org/security/en/glsa/glsa-200411-01.xml\n# It is released under the Nessus Script Licence.\n# The messages are release under the Creative Commons - Attribution /\n# Share Alike license. See http://creativecommons.org/licenses/by-sa/2.0/\n#\n# Avisory is copyright 2001-2004 Gentoo Foundation, Inc.\n# GLSA2nasl Convertor is copyright 2004 Michel Arboi\n\nif (! defined_func('bn_random')) exit(0);\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(15589);\n script_version(\"$Revision: 1.5 $\");\n\n script_cve_id(\"CVE-2004-1002\");\n script_xref(name: \"GLSA\", value: \"200411-01\");\n\n script_set_attribute(attribute:'synopsis', value: 'The remote host is missing the GLSA-200411-01 security update.');\n script_set_attribute(attribute:'description', value: 'The remote host is affected by the vulnerability described in\nGLSA-200411-01 (ppp: Remote denial of service vulnerability)\n\n The pppd server improperly verifies header fields, making it vulnerable to\n denial of service attacks.\n \nImpact\n\n An attacker can cause the pppd server to access memory that it isn\\'t\n allowed to, causing the server to crash. No code execution is possible with\n this vulnerability, because no data is getting copied.\n \nWorkaround\n\n There is no known workaround at this time.');\nscript_set_attribute(attribute: 'see_also', value: 'http://www.securityfocus.com/archive/1/379450');\nscript_set_attribute(attribute: 'see_also', value: 'http://www.gentoo.org/security/en/glsa/glsa-200411-01.xml');\n\nscript_set_attribute(attribute:'solution', value: ' All ppp users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose \">=net-dialup/ppp-2.4.2-r7\"');\nscript_set_attribute(attribute: 'cvss_vector', value: 'CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P');\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2004/11/02\");\nscript_end_attributes();\n\n script_copyright(english: \"This script is Copyright (C) 2004-2010 Tenable Network Security, Inc.\");\n script_name(english: \"[GLSA-200411-01] ppp: Remote denial of service vulnerability\");\n script_category(ACT_GATHER_INFO);\n script_family(english: \"Gentoo Local Security Checks\");\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys('Host/Gentoo/qpkg-list');\n script_summary(english: 'ppp: Remote denial of service vulnerability');\n exit(0);\n}\n\nexit(0); # Gentoo now claims it's not an issue\ninclude('qpkg.inc');\nif (qpkg_check(package: \"net-dialup/ppp\", unaffected: make_list(\"ge 2.4.2-r7\"), vulnerable: make_list(\"lt 2.4.2-r7\")\n)) { security_warning(0); exit(0); }\n"}
{"cve": [{"lastseen": "2020-10-03T11:33:39", "description": "Integer underflow in pppd in cbcp.c for ppp 2.4.1 allows remote attackers to cause a denial of service (daemon crash) via a CBCP packet with an invalid length value that causes pppd to access an incorrect memory location.", "edition": 4, "cvss3": {}, "published": "2005-03-01T05:00:00", "title": "CVE-2004-1002", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2004-1002"], "modified": "2020-02-24T15:55:00", "cpe": ["cpe:/a:point-to-point_protocol_project:point-to-point_protocol:2.4.1"], "id": "CVE-2004-1002", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1002", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:point-to-point_protocol_project:point-to-point_protocol:2.4.1:*:*:*:*:*:*:*"]}], "ubuntu": [{"lastseen": "2020-07-09T17:41:27", "bulletinFamily": "unix", "cvelist": ["CVE-2004-1002"], "description": "It has been discovered that ppp does not properly verify certain data \nstructures used in the CBCP protocol. This vulnerability could allow \nan attacker to cause the pppd server to crash due to an invalid memory \naccess, leading to a denial of service. However, there is no \npossibility of code execution or privilege escalation.", "edition": 15, "modified": "2004-10-29T00:00:00", "published": "2004-10-29T00:00:00", "id": "USN-12-1", "href": "https://ubuntu.com/security/notices/USN-12-1", "title": "ppp Denial of Service", "type": "ubuntu", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "osvdb": [{"lastseen": "2017-04-28T13:20:06", "bulletinFamily": "software", "cvelist": ["CVE-2004-1002"], "edition": 1, "description": "## Vulnerability Description\nA remote overflow exists in Samba's PPP implementation. It was reported that an attacker could take advantage of an integer underflow in the cbcp_input() function of cbcp.c to deny service to the server. Subsequent reports indicated that this flaw could only be used to disconnect the attacker's own PPP session, not the sessions of other users.\n## Solution Description\nThe vulnerability reported is incorrect. No solution required.\n## Short Description\nA remote overflow exists in Samba's PPP implementation. It was reported that an attacker could take advantage of an integer underflow in the cbcp_input() function of cbcp.c to deny service to the server. Subsequent reports indicated that this flaw could only be used to disconnect the attacker's own PPP session, not the sessions of other users.\n## References:\nVendor URL: http://www.samba.org/ppp/features.html\nVendor Specific Solution URL: http://cvs.samba.org/cgi-bin/cvsweb/ppp/pppd/cbcp.c.diff?r1=1.15&r2=1.16\n[Vendor Specific Advisory URL](http://www.gentoo.org/security/en/glsa/glsa-200411-01.xml)\nSecurity Tracker: 1011949\n[Secunia Advisory ID:13049](https://secuniaresearch.flexerasoftware.com/advisories/13049/)\n[Secunia Advisory ID:12989](https://secuniaresearch.flexerasoftware.com/advisories/12989/)\nMail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2004-11/0011.html\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2004-10/0278.html\nISS X-Force ID: 17874\n[CVE-2004-1002](https://vulners.com/cve/CVE-2004-1002)\n", "modified": "2004-10-28T09:34:23", "published": "2004-10-28T09:34:23", "href": "https://vulners.com/osvdb/OSVDB:11178", "id": "OSVDB:11178", "title": "pppd Malformed CBCP Packet Remote DoS", "type": "osvdb", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}]}