Arch Linux Security Advisory ASA-201508-3 ========================================= Severity: Low Date : 2015-08-11 CVE-ID : CVE-2015-3310 Package : ppp Type : denial of service Remote : Yes Link : https://wiki.archlinux.org/index.php/CVE Summary ======= The package ppp before version 2.4.7-2 is vulnerable to remote denial of service. Resolution ========== Upgrade to 2.4.7-2. # pacman -Syu "ppp>=2.4.7-2" The problem has not been fixed upstream yet. Workaround ========== This issue can be mitigated by disabling RADIUS authentication. Description =========== A buffer overflow has been found in the rc_mksid() function in plugins/radius/util.c in Paul's PPP Package (ppp). When the PID of the pppd process is greater than 65535, the computation of a start accounting message to the RADIUS server will crash the pppd server. Impact ====== A remote attacker can crash the pppd server. References ========== https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3310 http://www.openwall.com/lists/oss-security/2015/04/16/7 https://bugs.archlinux.org/task/44607 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782450