CVE-2014-3158 in ppp
Summary
Integer overflow in the getword function in options.c in pppd in Paul's PPP Package (ppp) before 2.4.7 allows attackers to "access privileged options" via a long word in an options file, which triggers a heap-based buffer overflow that "[corrupts] security-relevant variables."
If you want to get best quality of vulnerability data, you may have to visit VulDB.
Reservation
05/03/2014
Disclosure
11/15/2014
Status
Confirmed
Entries
VulDB provides additional information and datapoints for this CVE:
| ID | Vulnerability | CWE | Exp | Cou | CVE |
|---|---|---|---|---|---|
| 67449 | Red Hat ppp options.c memory corruption | 119 | Unproven | Official fix | CVE-2014-3158 |