4.3
CVSSv2

CVE-2015-3310

Published: 24/04/2015 Updated: 24/02/2020
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

Buffer overflow in the rc_mksid function in plugins/radius/util.c in Paul's PPP Package (ppp) 2.4.6 and previous versions, when the PID for pppd is greater than 65535, allows remote malicious users to cause a denial of service (crash) via a start accounting message to the RADIUS server.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

canonical ubuntu linux 14.10

debian debian linux 7.0

point-to-point protocol project point-to-point protocol

Vendor Advisories

Debian Bug report logs - #782450 ppp: CVE-2015-3310: Buffer overflow in radius plugin Package: ppp; Maintainer for ppp is Chris Boot <bootc@debianorg>; Source for ppp is src:ppp (PTS, buildd, popcon) Reported by: Emanuele Rocca <ema@linuxit> Date: Sun, 12 Apr 2015 12:21:07 UTC Severity: important Tags: patch, secu ...
ppp could be made to crash if it received specially crafted network traffic ...
Buffer overflow in the rc_mksid function in plugins/radius/utilc in Paul's PPP Package (ppp) 246 and earlier, when the PID for pppd is greater than 65535, allows remote attackers to cause a denial of service (crash) via a start accounting message to the RADIUS server ...