Format string vulnerability in Point-to-Point Protocol (PPP) daemon (pppd) 2.4.0 for Mac OS X 10.3.2 and earlier allows remote attackers to read arbitrary pppd process data, including PAP or CHAP authentication credentials, to gain privileges.
References
Link | Resource |
---|---|
http://www.atstake.com/research/advisories/2004/a022304-1.txt | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/bid/9730 | Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/841742 | Third Party Advisory US Government Resource |
http://lists.apple.com/archives/security-announce/2004/Feb/msg00000.html | |
http://www.osvdb.org/6822 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15297 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2004-03-14 21:00
Updated : 2017-10-09 18:30
NVD link : CVE-2004-0165
Mitre link : CVE-2004-0165
JSON object : View
CWE
Products Affected
apple
- mac_os_x
- mac_os_x_server