[arch-security] [ASA-201508-3] ppp: denial of service
Remi Gacogne
rgacogne at archlinux.org
Tue Aug 11 09:16:58 UTC 2015
Arch Linux Security Advisory ASA-201508-3
=========================================
Severity: Low
Date : 2015-08-11
CVE-ID : CVE-2015-3310
Package : ppp
Type : denial of service
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
Summary
=======
The package ppp before version 2.4.7-2 is vulnerable to remote denial of
service.
Resolution
==========
Upgrade to 2.4.7-2.
# pacman -Syu "ppp>=2.4.7-2"
The problem has not been fixed upstream yet.
Workaround
==========
This issue can be mitigated by disabling RADIUS authentication.
Description
===========
A buffer overflow has been found in the rc_mksid() function in
plugins/radius/util.c in Paul's PPP Package (ppp).
When the PID of the pppd process is greater than 65535, the computation
of a start accounting message to the RADIUS server will crash the pppd
server.
Impact
======
A remote attacker can crash the pppd server.
References
==========
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3310
http://www.openwall.com/lists/oss-security/2015/04/16/7
https://bugs.archlinux.org/task/44607
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782450
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20150811/2284b574/attachment.asc>
More information about the arch-security
mailing list