Arch Linux Security Advisory ASA-201508-3
========================================
Severity: Low
Date    : 2015-08-11
CVE-ID  : CVE-2015-3310
Package : ppp
Type    : denial of service
Remote  : Yes
Link    : https://wiki.archlinux.org/title/CVE

Summary
======
The package ppp before version 2.4.7-2 is vulnerable to remote denial of
service.

Resolution
=========
Upgrade to 2.4.7-2.

# pacman -Syu "ppp>=2.4.7-2"

The problem has not been fixed upstream yet.

Workaround
=========
This issue can be mitigated by disabling RADIUS authentication.

Description
==========
A buffer overflow has been found in the rc_mksid() function in
plugins/radius/util.c in Paul's PPP Package (ppp).
When the PID of the pppd process is greater than 65535, the computation
of a start accounting message to the RADIUS server will crash the pppd
server.

Impact
=====
A remote attacker can crash the pppd server.

References
=========
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3310
https://www.openwall.com/lists/oss-security/2015/04/16/7
https://bugs.archlinux.org/task/44607
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782450

ArchLinux: 201508-3: ppp: denial of service

August 11, 2015

Summary

A buffer overflow has been found in the rc_mksid() function in plugins/radius/util.c in Paul's PPP Package (ppp). When the PID of the pppd process is greater than 65535, the computation of a start accounting message to the RADIUS server will crash the pppd server.

Resolution

Upgrade to 2.4.7-2. # pacman -Syu "ppp>=2.4.7-2"
The problem has not been fixed upstream yet.

References

https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3310 https://www.openwall.com/lists/oss-security/2015/04/16/7 https://bugs.archlinux.org/task/44607 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782450

Severity
Package : ppp
Type : denial of service
Remote : Yes
Link : https://wiki.archlinux.org/title/CVE

Workaround

This issue can be mitigated by disabling RADIUS authentication.

Related News