Vulnerability Bulletins |
DSA-3228 ppp - security update |
|
System information |
|
Affected software | Debian |
Description |
|
Emanuele Rocca discovered that ppp, a daemon implementing thePoint-to-Point Protocol, was subject to a buffer overflow whencommunicating with a RADIUS server. This would allow unauthenticatedusers to cause a denial-of-service by crashing the daemon. More info: https://www.debian.org/security/2015/dsa-3228 |
|
Standar resources |
|
Property | Value |
CVE | CVE-2015-3310 and DSA-3228. |
Version history |
||
Version | Comments | Date |
1.0 | Advisory issued | 2015-04-18 |