Summary
Detail | |||
---|---|---|---|
Vendor | Point-To-Point Protocol Project | First view | 2002-08-12 |
Product | Point-To-Point Protocol | Last view | 2020-02-03 |
Version | Type | Application | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.8 | 2020-02-03 | CVE-2020-8597 | eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions. |
9.8 | 2018-06-14 | CVE-2018-11574 | Improper input validation together with an integer overflow in the EAP-TLS protocol implementation in PPPD may cause a crash, information disclosure, or authentication bypass. This implementation is distributed as a patch for PPPD 0.91, and includes the affected eap.c and eap-tls.c files. Configurations that use the `refuse-app` option are unaffected. |
4.3 | 2015-04-24 | CVE-2015-3310 | Buffer overflow in the rc_mksid function in plugins/radius/util.c in Paul's PPP Package (ppp) 2.4.6 and earlier, when the PID for pppd is greater than 65535, allows remote attackers to cause a denial of service (crash) via a start accounting message to the RADIUS server. |
7.5 | 2014-11-15 | CVE-2014-3158 | Integer overflow in the getword function in options.c in pppd in Paul's PPP Package (ppp) before 2.4.7 allows attackers to "access privileged options" via a long word in an options file, which triggers a heap-based buffer overflow that "[corrupts] security-relevant variables." |
7.2 | 2006-07-05 | CVE-2006-2194 | The winbind plugin in pppd for ppp 2.4.4 and earlier does not check the return code from the setuid function call, which might allow local users to gain privileges by causing setuid to fail, such as exceeding PAM limits for the maximum number of user processes, which prevents the winbind NTLM authentication helper from dropping privileges. |
5 | 2005-03-01 | CVE-2004-1002 | Integer underflow in pppd in cbcp.c for ppp 2.4.1 allows remote attackers to cause a denial of service (daemon crash) via a CBCP packet with an invalid length value that causes pppd to access an incorrect memory location. |
7.5 | 2004-12-31 | CVE-2004-2695 | SQL injection vulnerability in the Authorize.net callback code (subscriptions/authorize.php) in Jelsoft vBulletin 3.0 through 3.0.3 allows remote attackers to execute arbitrary SQL statements via the x_invoice_num parameter. NOTE: this issue might be related to CVE-2006-4267. |
1.2 | 2002-08-12 | CVE-2002-0824 | BSD pppd allows local users to change the permissions of arbitrary files via a symlink attack on a file that is specified as a tty device. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
33% (2) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
16% (1) | CWE-190 | Integer Overflow or Wraparound |
16% (1) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
16% (1) | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('... |
16% (1) | CWE-20 | Improper Input Validation |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:26520 | SUSE-SU-2014:1088-1 -- Security update for ppp |
oval:org.mitre.oval:def:28448 | USN-2429-1 -- ppp vulnerability |
oval:org.mitre.oval:def:28067 | DSA-3079-1 -- ppp security update |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
26994 | ppp Winbind Plugin setuid Failure Local Privilege Escalation |
20753 | Multiple BSD pppd Race Condition Arbitrary File Permission Modification |
11178 | pppd Malformed CBCP Packet Remote DoS |
9993 | vBulletin authorize.php x_invoice_num Parameter SQL Injection |
OpenVAS Exploits
id | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 1106-1 (ppp) File : nvt/deb_1106_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1150-1 (shadow) File : nvt/deb_1150_1.nasl |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-aed26fc705.nasl - Type: ACT_GATHER_INFO |
2018-06-29 | Name: The remote Fedora host is missing a security update. File: fedora_2018-b99d43ee9b.nasl - Type: ACT_GATHER_INFO |
2017-02-16 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-0474-1.nasl - Type: ACT_GATHER_INFO |
2017-02-16 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-0473-1.nasl - Type: ACT_GATHER_INFO |
2017-01-23 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201701-50.nasl - Type: ACT_GATHER_INFO |
2015-11-30 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2015-827.nasl - Type: ACT_GATHER_INFO |
2015-05-06 | Name: The remote Ubuntu host is missing a security-related patch. File: ubuntu_USN-2595-1.nasl - Type: ACT_GATHER_INFO |
2015-05-05 | Name: The remote Mandriva Linux host is missing one or more security updates. File: mandriva_MDVSA-2015-222.nasl - Type: ACT_GATHER_INFO |
2015-04-22 | Name: The remote Slackware host is missing a security update. File: Slackware_SSA_2015-111-11.nasl - Type: ACT_GATHER_INFO |
2015-04-20 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-3228.nasl - Type: ACT_GATHER_INFO |
2015-04-20 | Name: The remote Debian host is missing a security update. File: debian_DLA-205.nasl - Type: ACT_GATHER_INFO |
2015-03-30 | Name: The remote Mandriva Linux host is missing one or more security updates. File: mandriva_MDVSA-2015-135.nasl - Type: ACT_GATHER_INFO |
2015-03-26 | Name: The remote Debian host is missing a security update. File: debian_DLA-74.nasl - Type: ACT_GATHER_INFO |
2014-12-15 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201412-19.nasl - Type: ACT_GATHER_INFO |
2014-12-02 | Name: The remote Ubuntu host is missing a security-related patch. File: ubuntu_USN-2429-1.nasl - Type: ACT_GATHER_INFO |
2014-12-01 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-3079.nasl - Type: ACT_GATHER_INFO |
2014-09-17 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2014-545.nasl - Type: ACT_GATHER_INFO |
2014-09-12 | Name: The remote Mandriva Linux host is missing one or more security updates. File: mandriva_MDVSA-2014-178.nasl - Type: ACT_GATHER_INFO |
2014-09-04 | Name: The remote SuSE 11 host is missing a security update. File: suse_11_ppp-140826.nasl - Type: ACT_GATHER_INFO |
2014-08-30 | Name: The remote Fedora host is missing a security update. File: fedora_2014-9401.nasl - Type: ACT_GATHER_INFO |
2014-08-23 | Name: The remote Fedora host is missing a security update. File: fedora_2014-9412.nasl - Type: ACT_GATHER_INFO |
2007-11-10 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-310-1.nasl - Type: ACT_GATHER_INFO |
2006-10-14 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-1106.nasl - Type: ACT_GATHER_INFO |
2006-07-11 | Name: The remote Mandrake Linux host is missing one or more security updates. File: mandrake_MDKSA-2006-119.nasl - Type: ACT_GATHER_INFO |
2004-09-21 | Name: The remote web server contains a PHP script that is susceptible to a SQL inje... File: vbulletin_sql.nasl - Type: ACT_GATHER_INFO |