This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Point-To-Point Protocol Project First view 2004-12-31
Product Point-To-Point Protocol Last view 2020-02-03
Version 2.4.1 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:point-to-point_protocol_project:point-to-point_protocol

Activity : Overall

Related : CVE

  Date Alert Description
9.8 2020-02-03 CVE-2020-8597

eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions.

4.3 2015-04-24 CVE-2015-3310

Buffer overflow in the rc_mksid function in plugins/radius/util.c in Paul's PPP Package (ppp) 2.4.6 and earlier, when the PID for pppd is greater than 65535, allows remote attackers to cause a denial of service (crash) via a start accounting message to the RADIUS server.

7.5 2014-11-15 CVE-2014-3158

Integer overflow in the getword function in options.c in pppd in Paul's PPP Package (ppp) before 2.4.7 allows attackers to "access privileged options" via a long word in an options file, which triggers a heap-based buffer overflow that "[corrupts] security-relevant variables."

7.2 2006-07-05 CVE-2006-2194

The winbind plugin in pppd for ppp 2.4.4 and earlier does not check the return code from the setuid function call, which might allow local users to gain privileges by causing setuid to fail, such as exceeding PAM limits for the maximum number of user processes, which prevents the winbind NTLM authentication helper from dropping privileges.

5 2005-03-01 CVE-2004-1002

Integer underflow in pppd in cbcp.c for ppp 2.4.1 allows remote attackers to cause a denial of service (daemon crash) via a CBCP packet with an invalid length value that causes pppd to access an incorrect memory location.

7.5 2004-12-31 CVE-2004-2695

SQL injection vulnerability in the Authorize.net callback code (subscriptions/authorize.php) in Jelsoft vBulletin 3.0 through 3.0.3 allows remote attackers to execute arbitrary SQL statements via the x_invoice_num parameter. NOTE: this issue might be related to CVE-2006-4267.

CWE : Common Weakness Enumeration

%idName
50% (2) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
25% (1) CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflo...
25% (1) CWE-89 Improper Sanitization of Special Elements used in an SQL Command ('...

Open Source Vulnerability Database (OSVDB)

id Description
26994 ppp Winbind Plugin setuid Failure Local Privilege Escalation
11178 pppd Malformed CBCP Packet Remote DoS
9993 vBulletin authorize.php x_invoice_num Parameter SQL Injection

OpenVAS Exploits

id Description
2008-01-17 Name : Debian Security Advisory DSA 1106-1 (ppp)
File : nvt/deb_1106_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 1150-1 (shadow)
File : nvt/deb_1150_1.nasl

Nessus® Vulnerability Scanner

id Description
2017-02-16 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2017-0474-1.nasl - Type: ACT_GATHER_INFO
2017-02-16 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2017-0473-1.nasl - Type: ACT_GATHER_INFO
2017-01-23 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201701-50.nasl - Type: ACT_GATHER_INFO
2015-11-30 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2015-827.nasl - Type: ACT_GATHER_INFO
2015-05-06 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-2595-1.nasl - Type: ACT_GATHER_INFO
2015-05-05 Name: The remote Mandriva Linux host is missing one or more security updates.
File: mandriva_MDVSA-2015-222.nasl - Type: ACT_GATHER_INFO
2015-04-22 Name: The remote Slackware host is missing a security update.
File: Slackware_SSA_2015-111-11.nasl - Type: ACT_GATHER_INFO
2015-04-20 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3228.nasl - Type: ACT_GATHER_INFO
2015-04-20 Name: The remote Debian host is missing a security update.
File: debian_DLA-205.nasl - Type: ACT_GATHER_INFO
2015-03-30 Name: The remote Mandriva Linux host is missing one or more security updates.
File: mandriva_MDVSA-2015-135.nasl - Type: ACT_GATHER_INFO
2015-03-26 Name: The remote Debian host is missing a security update.
File: debian_DLA-74.nasl - Type: ACT_GATHER_INFO
2014-12-15 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201412-19.nasl - Type: ACT_GATHER_INFO
2014-12-02 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-2429-1.nasl - Type: ACT_GATHER_INFO
2014-12-01 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3079.nasl - Type: ACT_GATHER_INFO
2014-09-17 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2014-545.nasl - Type: ACT_GATHER_INFO
2014-09-12 Name: The remote Mandriva Linux host is missing one or more security updates.
File: mandriva_MDVSA-2014-178.nasl - Type: ACT_GATHER_INFO
2014-09-04 Name: The remote SuSE 11 host is missing a security update.
File: suse_11_ppp-140826.nasl - Type: ACT_GATHER_INFO
2014-08-30 Name: The remote Fedora host is missing a security update.
File: fedora_2014-9401.nasl - Type: ACT_GATHER_INFO
2014-08-23 Name: The remote Fedora host is missing a security update.
File: fedora_2014-9412.nasl - Type: ACT_GATHER_INFO
2007-11-10 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-310-1.nasl - Type: ACT_GATHER_INFO
2006-10-14 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-1106.nasl - Type: ACT_GATHER_INFO
2006-07-11 Name: The remote Mandrake Linux host is missing one or more security updates.
File: mandrake_MDKSA-2006-119.nasl - Type: ACT_GATHER_INFO
2004-09-21 Name: The remote web server contains a PHP script that is susceptible to a SQL inje...
File: vbulletin_sql.nasl - Type: ACT_GATHER_INFO