Improper input validation together with an integer overflow in the EAP-TLS protocol implementation in PPPD may cause a crash, information disclosure, or authentication bypass. This implementation is distributed as a patch for PPPD 0.91, and includes the affected eap.c and eap-tls.c files. Configurations that use the `refuse-app` option are unaffected.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2018/06/11/1 | Mailing List Patch Third Party Advisory |
https://usn.ubuntu.com/3810-1/ | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2018/06/11/1 | Mailing List Patch Third Party Advisory |
https://usn.ubuntu.com/3810-1/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2018/06/11/1 - Mailing List, Patch, Third Party Advisory | |
References | () https://usn.ubuntu.com/3810-1/ - Third Party Advisory |
Information
Published : 2018-06-14 20:29
Updated : 2024-11-21 03:43
NVD link : CVE-2018-11574
Mitre link : CVE-2018-11574
CVE.ORG link : CVE-2018-11574
JSON object : View
Products Affected
point-to-point_protocol_project
- point-to-point_protocol
canonical
- ubuntu_linux