[arch-security] [ASA-201508-3] ppp: denial of service

Remi Gacogne rgacogne at archlinux.org
Tue Aug 11 09:16:58 UTC 2015


Arch Linux Security Advisory ASA-201508-3
=========================================

Severity: Low
Date    : 2015-08-11
CVE-ID  : CVE-2015-3310
Package : ppp
Type    : denial of service
Remote  : Yes
Link    : https://wiki.archlinux.org/index.php/CVE

Summary
=======

The package ppp before version 2.4.7-2 is vulnerable to remote denial of
service.

Resolution
==========

Upgrade to 2.4.7-2.

# pacman -Syu "ppp>=2.4.7-2"

The problem has not been fixed upstream yet.

Workaround
==========

This issue can be mitigated by disabling RADIUS authentication.

Description
===========

A buffer overflow has been found in the rc_mksid() function in
plugins/radius/util.c in Paul's PPP Package (ppp).
When the PID of the pppd process is greater than 65535, the computation
of a start accounting message to the RADIUS server will crash the pppd
server.

Impact
======

A remote attacker can crash the pppd server.

References
==========

https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3310
http://www.openwall.com/lists/oss-security/2015/04/16/7
https://bugs.archlinux.org/task/44607
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782450

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20150811/2284b574/attachment.asc>


More information about the arch-security mailing list