CVE-2014-3158

Integer overflow in the getword function in options.c in pppd in Paul's PPP Package (ppp) before 2.4.7 allows attackers to "access privileged options" via a long word in an options file, which triggers a heap-based buffer overflow that "[corrupts] security-relevant variables."
Configurations

Configuration 1 (hide)

cpe:2.3:a:point-to-point_protocol_project:point-to-point_protocol:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:07

Type Values Removed Values Added
References () http://advisories.mageia.org/MGASA-2014-0368.html - () http://advisories.mageia.org/MGASA-2014-0368.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136932.html - () http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136932.html -
References () http://marc.info/?l=linux-ppp&m=140764978420764 - () http://marc.info/?l=linux-ppp&m=140764978420764 -
References () http://www.debian.org/security/2014/dsa-3079 - () http://www.debian.org/security/2014/dsa-3079 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2015:135 - () http://www.mandriva.com/security/advisories?name=MDVSA-2015:135 -
References () http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html - () http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -
References () http://www.ubuntu.com/usn/USN-2429-1 - () http://www.ubuntu.com/usn/USN-2429-1 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1128748 - () https://bugzilla.redhat.com/show_bug.cgi?id=1128748 -
References () https://github.com/paulusmack/ppp/commit/7658e8257183f062dc01f87969c140707c7e52cb - () https://github.com/paulusmack/ppp/commit/7658e8257183f062dc01f87969c140707c7e52cb -

07 Nov 2023, 02:19

Type Values Removed Values Added
References (DEBIAN) http://www.debian.org/security/2014/dsa-3079 - () http://www.debian.org/security/2014/dsa-3079 -
References (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136932.html - () http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136932.html -
References (UBUNTU) http://www.ubuntu.com/usn/USN-2429-1 - () http://www.ubuntu.com/usn/USN-2429-1 -
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2015:135 - () http://www.mandriva.com/security/advisories?name=MDVSA-2015:135 -
References (CONFIRM) http://advisories.mageia.org/MGASA-2014-0368.html - () http://advisories.mageia.org/MGASA-2014-0368.html -
References (CONFIRM) https://github.com/paulusmack/ppp/commit/7658e8257183f062dc01f87969c140707c7e52cb - Patch, Vendor Advisory () https://github.com/paulusmack/ppp/commit/7658e8257183f062dc01f87969c140707c7e52cb -
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=1128748 - () https://bugzilla.redhat.com/show_bug.cgi?id=1128748 -
References (MLIST) http://marc.info/?l=linux-ppp&m=140764978420764 - () http://marc.info/?l=linux-ppp&m=140764978420764 -
References (CONFIRM) http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html - () http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -

Information

Published : 2014-11-15 21:59

Updated : 2024-11-21 02:07


NVD link : CVE-2014-3158

Mitre link : CVE-2014-3158

CVE.ORG link : CVE-2014-3158


JSON object : View

Products Affected

point-to-point_protocol_project

  • point-to-point_protocol
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer