7.5
CVSSv2

CVE-2014-3158

Published: 15/11/2014 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 670
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in the getword function in options.c in pppd in Paul's PPP Package (ppp) prior to 2.4.7 allows malicious users to "access privileged options" via a long word in an options file, which triggers a heap-based buffer overflow that "[corrupts] security-relevant variables."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

point-to-point protocol project point-to-point protocol

Vendor Advisories

Debian Bug report logs - #762789 ppp: CVE-2014-3158: Integer overflow in option parsing Package: ppp; Maintainer for ppp is Chris Boot <bootc@debianorg>; Source for ppp is src:ppp (PTS, buildd, popcon) Reported by: Raphael Hertzog <hertzog@debianorg> Date: Thu, 25 Sep 2014 08:12:01 UTC Severity: grave Tags: securi ...
ppp could be made to crash or run programs as an administrator if it opened a specially crafted file ...
A vulnerability was discovered in ppp, an implementation of the Point-to-Point Protocol: an integer overflow in the routine responsible for parsing user-supplied options potentially allows a local attacker to gain root privileges For the stable distribution (wheezy), this problem has been fixed in version 245-51+deb7u1 For the upcoming stable ...