Improper input validation together with an integer overflow in the EAP-TLS protocol implementation in PPPD may cause a crash, information disclosure, or authentication bypass. This implementation is distributed as a patch for PPPD 0.91, and includes the affected eap.c and eap-tls.c files. Configurations that use the `refuse-app` option are unaffected.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2018/06/11/1 | Mailing List Patch Third Party Advisory |
https://usn.ubuntu.com/3810-1/ | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-06-14 20:29
Updated : 2024-02-04 19:46
NVD link : CVE-2018-11574
Mitre link : CVE-2018-11574
CVE.ORG link : CVE-2018-11574
JSON object : View
Products Affected
point-to-point_protocol_project
- point-to-point_protocol
canonical
- ubuntu_linux