Format string vulnerability in Point-to-Point Protocol (PPP) daemon (pppd) 2.4.0 for Mac OS X 10.3.2 and earlier allows remote attackers to read arbitrary pppd process data, including PAP or CHAP authentication credentials, to gain privileges.
References
Link | Resource |
---|---|
http://lists.apple.com/archives/security-announce/2004/Feb/msg00000.html | |
http://www.atstake.com/research/advisories/2004/a022304-1.txt | Exploit Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/841742 | Third Party Advisory US Government Resource |
http://www.osvdb.org/6822 | |
http://www.securityfocus.com/bid/9730 | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15297 | |
http://lists.apple.com/archives/security-announce/2004/Feb/msg00000.html | |
http://www.atstake.com/research/advisories/2004/a022304-1.txt | Exploit Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/841742 | Third Party Advisory US Government Resource |
http://www.osvdb.org/6822 | |
http://www.securityfocus.com/bid/9730 | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15297 |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:47
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.apple.com/archives/security-announce/2004/Feb/msg00000.html - | |
References | () http://www.atstake.com/research/advisories/2004/a022304-1.txt - Exploit, Patch, Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/841742 - Third Party Advisory, US Government Resource | |
References | () http://www.osvdb.org/6822 - | |
References | () http://www.securityfocus.com/bid/9730 - Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/15297 - |
Information
Published : 2004-03-15 05:00
Updated : 2024-11-20 23:47
NVD link : CVE-2004-0165
Mitre link : CVE-2004-0165
CVE.ORG link : CVE-2004-0165
JSON object : View
Products Affected
apple
- mac_os_x
- mac_os_x_server
CWE