The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel through 4.3.3 do not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.
References
Configurations
History
No history.
Information
Published : 2015-12-28 11:59
Updated : 2024-02-04 18:53
NVD link : CVE-2015-8569
Mitre link : CVE-2015-8569
CVE.ORG link : CVE-2015-8569
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor