Improper input validation together with an integer overflow in the EAP-TLS protocol implementation in PPPD may cause a crash, information disclosure, or authentication bypass. This implementation is distributed as a patch for PPPD 0.91, and includes the affected eap.c and eap-tls.c files. Configurations that use the `refuse-app` option are unaffected.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2018/06/11/1 | Mailing List Patch Third Party Advisory |
https://usn.ubuntu.com/3810-1/ | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2018/06/11/1 | Mailing List Patch Third Party Advisory |
https://usn.ubuntu.com/3810-1/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2018/06/11/1 - Mailing List, Patch, Third Party Advisory | |
References | () https://usn.ubuntu.com/3810-1/ - Third Party Advisory |
11 Sep 2023, 19:43
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:point-to-point_protocol_project:point-to-point_protocol:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:* |
|
First Time |
Canonical ubuntu Linux
Canonical |
|
References | (UBUNTU) https://usn.ubuntu.com/3810-1/ - Third Party Advisory |
Information
Published : 2018-06-14 20:29
Updated : 2024-11-21 03:43
NVD link : CVE-2018-11574
Mitre link : CVE-2018-11574
CVE.ORG link : CVE-2018-11574
JSON object : View
Products Affected
canonical
- ubuntu_linux
point-to-point_protocol_project
- point-to-point_protocol