668
VMScore

CVE-2018-11574

Published: 14/06/2018 Updated: 11/09/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Improper input validation together with an integer overflow in the EAP-TLS protocol implementation in PPPD may cause a crash, information disclosure, or authentication bypass. This implementation is distributed as a patch for PPPD 0.91, and includes the affected eap.c and eap-tls.c files. Configurations that use the `refuse-app` option are unaffected.

Vulnerable Product Search on Vulmon Subscribe to Product

point-to-point protocol project point-to-point protocol

canonical ubuntu linux 14.04

canonical ubuntu linux 16.04

canonical ubuntu linux 18.04

Vendor Advisories

ppp could be made to crash or bypass authentication if it received specially crafted network traffic ...
Improper input validation together with an integer overflow in the EAP-TLS protocol implementation in PPPD may cause a crash, information disclosure, or authentication bypass This implementation is distributed as a patch for PPPD 091, and includes the affected eapc and eap-tlsc files Configurations that use the `refuse-app` option are unaffect ...