CVE-2014-3158 in pppinfo

Summary

Integer overflow in the getword function in options.c in pppd in Paul's PPP Package (ppp) before 2.4.7 allows attackers to "access privileged options" via a long word in an options file, which triggers a heap-based buffer overflow that "[corrupts] security-relevant variables."

If you want to get best quality of vulnerability data, you may have to visit VulDB.

Reservation

05/03/2014

Disclosure

11/15/2014

Status

Confirmed

Entries

VulDB provides additional information and datapoints for this CVE:

Sources

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!