Lucene search

K
redhatcveRedhat.comRH:CVE-2018-11574
HistoryJun 12, 2018 - 4:51 a.m.

CVE-2018-11574

2018-06-1204:51:28
redhat.com
access.redhat.com
12

EPSS

0.002

Percentile

58.7%

Improper input validation together with an integer overflow in the EAP-TLS protocol implementation in PPPD may cause a crash, information disclosure, or authentication bypass. This implementation is distributed as a patch for PPPD 0.91, and includes the affected eap.c and eap-tls.c files. Configurations that use the refuse-app option are unaffected.

Mitigation

PPP instances must be configured for EAP-TLS authentication to expose this vulnerability. For ppp servers, the file /etc/ppp/eaptls-server' must exist. For clients, either /etc/ppp/eaptls-clientmust exist or command-line optionsca, certandkey` must be provided.

EPSS

0.002

Percentile

58.7%