Vulnerability Bulletins

DSA-3228 ppp - security update


System information

   
Affected software Debian

Description

Emanuele Rocca discovered that ppp, a daemon implementing thePoint-to-Point Protocol, was subject to a buffer overflow whencommunicating with a RADIUS server. This would allow unauthenticatedusers to cause a denial-of-service by crashing the daemon.

More info:

https://www.debian.org/security/2015/dsa-3228

Standar resources

Property Value
CVE CVE-2015-3310 and DSA-3228.

Version history

Version Comments Date
1.0 Advisory issued 2015-04-19
Ministerio de Defensa
CNI
CCN
CCN-CERT