Описание
Integer overflow in the getword function in options.c in pppd in Paul's PPP Package (ppp) before 2.4.7 allows attackers to "access privileged options" via a long word in an options file, which triggers a heap-based buffer overflow that "[corrupts] security-relevant variables."
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 2.4.5-5.1ubuntu5 |
| esm-infra-legacy/trusty | released | 2.4.5-5.1ubuntu2.1 |
| lucid | released | 2.4.5~git20081126t100229-0ubuntu3.1 |
| precise | released | 2.4.5-5ubuntu1.1 |
| trusty | released | 2.4.5-5.1ubuntu2.1 |
| trusty/esm | released | 2.4.5-5.1ubuntu2.1 |
| upstream | released | 2.4.6-3 |
| utopic | released | 2.4.5-5.1ubuntu3.1 |
Показывать по
7.5 High
CVSS2
Связанные уязвимости
Integer overflow in the getword function in options.c in pppd in Paul's PPP Package (ppp) before 2.4.7 allows attackers to "access privileged options" via a long word in an options file, which triggers a heap-based buffer overflow that "[corrupts] security-relevant variables."
Integer overflow in the getword function in options.c in pppd in Paul's PPP Package (ppp) before 2.4.7 allows attackers to "access privileged options" via a long word in an options file, which triggers a heap-based buffer overflow that "[corrupts] security-relevant variables."
Integer overflow in the getword function in options.c in pppd in Paul' ...
Integer overflow in the getword function in options.c in pppd in Paul's PPP Package (ppp) before 2.4.7 allows attackers to "access privileged options" via a long word in an options file, which triggers a heap-based buffer overflow that "[corrupts] security-relevant variables."
Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
7.5 High
CVSS2