This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Point-To-Point Protocol Project First view 2002-08-12
Product Point-To-Point Protocol Last view 2020-02-03
Version Type Application
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:point-to-point_protocol_project:point-to-point_protocol:2.4.1:*:*:*:*:*:*:* 6
cpe:2.3:a:point-to-point_protocol_project:point-to-point_protocol:-:*:*:*:*:*:*:* 5
cpe:2.3:a:point-to-point_protocol_project:point-to-point_protocol:*:*:*:*:*:*:*:* 5
cpe:2.3:a:point-to-point_protocol_project:point-to-point_protocol:2.4.4:*:*:*:*:*:*:* 4
cpe:2.3:a:point-to-point_protocol_project:point-to-point_protocol:2.4.6:*:*:*:*:*:*:* 3

Related : CVE

  Date Alert Description
9.8 2020-02-03 CVE-2020-8597

eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions.

9.8 2018-06-14 CVE-2018-11574

Improper input validation together with an integer overflow in the EAP-TLS protocol implementation in PPPD may cause a crash, information disclosure, or authentication bypass. This implementation is distributed as a patch for PPPD 0.91, and includes the affected eap.c and eap-tls.c files. Configurations that use the `refuse-app` option are unaffected.

4.3 2015-04-24 CVE-2015-3310

Buffer overflow in the rc_mksid function in plugins/radius/util.c in Paul's PPP Package (ppp) 2.4.6 and earlier, when the PID for pppd is greater than 65535, allows remote attackers to cause a denial of service (crash) via a start accounting message to the RADIUS server.

7.5 2014-11-15 CVE-2014-3158

Integer overflow in the getword function in options.c in pppd in Paul's PPP Package (ppp) before 2.4.7 allows attackers to "access privileged options" via a long word in an options file, which triggers a heap-based buffer overflow that "[corrupts] security-relevant variables."

7.2 2006-07-05 CVE-2006-2194

The winbind plugin in pppd for ppp 2.4.4 and earlier does not check the return code from the setuid function call, which might allow local users to gain privileges by causing setuid to fail, such as exceeding PAM limits for the maximum number of user processes, which prevents the winbind NTLM authentication helper from dropping privileges.

5 2005-03-01 CVE-2004-1002

Integer underflow in pppd in cbcp.c for ppp 2.4.1 allows remote attackers to cause a denial of service (daemon crash) via a CBCP packet with an invalid length value that causes pppd to access an incorrect memory location.

7.5 2004-12-31 CVE-2004-2695

SQL injection vulnerability in the Authorize.net callback code (subscriptions/authorize.php) in Jelsoft vBulletin 3.0 through 3.0.3 allows remote attackers to execute arbitrary SQL statements via the x_invoice_num parameter. NOTE: this issue might be related to CVE-2006-4267.

1.2 2002-08-12 CVE-2002-0824

BSD pppd allows local users to change the permissions of arbitrary files via a symlink attack on a file that is specified as a tty device.

CWE : Common Weakness Enumeration

%idName
33% (2) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
16% (1) CWE-190 Integer Overflow or Wraparound
16% (1) CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflo...
16% (1) CWE-89 Improper Sanitization of Special Elements used in an SQL Command ('...
16% (1) CWE-20 Improper Input Validation

Oval Markup Language : Definitions

OvalID Name
oval:org.mitre.oval:def:26520 SUSE-SU-2014:1088-1 -- Security update for ppp
oval:org.mitre.oval:def:28448 USN-2429-1 -- ppp vulnerability
oval:org.mitre.oval:def:28067 DSA-3079-1 -- ppp security update

Open Source Vulnerability Database (OSVDB)

id Description
26994 ppp Winbind Plugin setuid Failure Local Privilege Escalation
20753 Multiple BSD pppd Race Condition Arbitrary File Permission Modification
11178 pppd Malformed CBCP Packet Remote DoS
9993 vBulletin authorize.php x_invoice_num Parameter SQL Injection

OpenVAS Exploits

id Description
2008-01-17 Name : Debian Security Advisory DSA 1106-1 (ppp)
File : nvt/deb_1106_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 1150-1 (shadow)
File : nvt/deb_1150_1.nasl

Nessus® Vulnerability Scanner

id Description
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-aed26fc705.nasl - Type: ACT_GATHER_INFO
2018-06-29 Name: The remote Fedora host is missing a security update.
File: fedora_2018-b99d43ee9b.nasl - Type: ACT_GATHER_INFO
2017-02-16 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2017-0474-1.nasl - Type: ACT_GATHER_INFO
2017-02-16 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2017-0473-1.nasl - Type: ACT_GATHER_INFO
2017-01-23 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201701-50.nasl - Type: ACT_GATHER_INFO
2015-11-30 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2015-827.nasl - Type: ACT_GATHER_INFO
2015-05-06 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-2595-1.nasl - Type: ACT_GATHER_INFO
2015-05-05 Name: The remote Mandriva Linux host is missing one or more security updates.
File: mandriva_MDVSA-2015-222.nasl - Type: ACT_GATHER_INFO
2015-04-22 Name: The remote Slackware host is missing a security update.
File: Slackware_SSA_2015-111-11.nasl - Type: ACT_GATHER_INFO
2015-04-20 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3228.nasl - Type: ACT_GATHER_INFO
2015-04-20 Name: The remote Debian host is missing a security update.
File: debian_DLA-205.nasl - Type: ACT_GATHER_INFO
2015-03-30 Name: The remote Mandriva Linux host is missing one or more security updates.
File: mandriva_MDVSA-2015-135.nasl - Type: ACT_GATHER_INFO
2015-03-26 Name: The remote Debian host is missing a security update.
File: debian_DLA-74.nasl - Type: ACT_GATHER_INFO
2014-12-15 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201412-19.nasl - Type: ACT_GATHER_INFO
2014-12-02 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-2429-1.nasl - Type: ACT_GATHER_INFO
2014-12-01 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3079.nasl - Type: ACT_GATHER_INFO
2014-09-17 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2014-545.nasl - Type: ACT_GATHER_INFO
2014-09-12 Name: The remote Mandriva Linux host is missing one or more security updates.
File: mandriva_MDVSA-2014-178.nasl - Type: ACT_GATHER_INFO
2014-09-04 Name: The remote SuSE 11 host is missing a security update.
File: suse_11_ppp-140826.nasl - Type: ACT_GATHER_INFO
2014-08-30 Name: The remote Fedora host is missing a security update.
File: fedora_2014-9401.nasl - Type: ACT_GATHER_INFO
2014-08-23 Name: The remote Fedora host is missing a security update.
File: fedora_2014-9412.nasl - Type: ACT_GATHER_INFO
2007-11-10 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-310-1.nasl - Type: ACT_GATHER_INFO
2006-10-14 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-1106.nasl - Type: ACT_GATHER_INFO
2006-07-11 Name: The remote Mandrake Linux host is missing one or more security updates.
File: mandrake_MDKSA-2006-119.nasl - Type: ACT_GATHER_INFO
2004-09-21 Name: The remote web server contains a PHP script that is susceptible to a SQL inje...
File: vbulletin_sql.nasl - Type: ACT_GATHER_INFO