CVE-2014-3158 (retired)

Priority
Description
Integer overflow in the getword function in options.c in pppd in Paul's PPP
Package (ppp) before 2.4.7 allows attackers to "access privileged options"
via a long word in an options file, which triggers a heap-based buffer
overflow that "[corrupts] security-relevant variables."
Assigned-to
mdeslaur
Package
Source: ppp (LP Ubuntu Debian)
Upstream:released (2.4.6-3)
Patches:
Upstream:https://github.com/paulusmack/ppp/commit/7658e8257183f062dc01f87969c140707c7e52cb
More Information

Updated: 2019-08-23 09:02:26 UTC (commit 436fd4ed4cf0038ddd382cb8649607ace163dda7)