Format string vulnerability in Point-to-Point Protocol (PPP) daemon (pppd) 2.4.0 for Mac OS X 10.3.2 and previous versions allows remote malicious users to read arbitrary pppd process data, including PAP or CHAP authentication credentials, to gain privileges.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apple mac os x 10.1 |
||
apple mac os x 10.1.1 |
||
apple mac os x 10.2.2 |
||
apple mac os x 10.2.3 |
||
apple mac os x 10.3.1 |
||
apple mac os x 10.3.2 |
||
apple mac os x server 10.1 |
||
apple mac os x server 10.2.1 |
||
apple mac os x server 10.2.2 |
||
apple mac os x server 10.3 |
||
apple mac os x server 10.3.1 |
||
apple mac os x 10.1.2 |
||
apple mac os x 10.1.3 |
||
apple mac os x 10.2.4 |
||
apple mac os x 10.2.5 |
||
apple mac os x server 10.1.1 |
||
apple mac os x server 10.1.2 |
||
apple mac os x server 10.2.3 |
||
apple mac os x server 10.2.4 |
||
apple mac os x server 10.3.2 |
||
apple mac os x 10.2 |
||
apple mac os x 10.2.1 |
||
apple mac os x 10.2.8 |
||
apple mac os x 10.3 |
||
apple mac os x server 10.1.5 |
||
apple mac os x server 10.2 |
||
apple mac os x server 10.2.7 |
||
apple mac os x server 10.2.8 |
||
apple mac os x 10.1.4 |
||
apple mac os x 10.1.5 |
||
apple mac os x 10.2.6 |
||
apple mac os x 10.2.7 |
||
apple mac os x server 10.1.3 |
||
apple mac os x server 10.1.4 |
||
apple mac os x server 10.2.5 |
||
apple mac os x server 10.2.6 |