Improper input validation together with an integer overflow in the EAP-TLS protocol implementation in PPPD may cause a crash, information disclosure, or authentication bypass. This implementation is distributed as a patch for PPPD 0.91, and includes the affected eap.c and eap-tls.c files. Configurations that use the `refuse-app` option are unaffected.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2018/06/11/1 | Mailing List Patch Third Party Advisory |
https://usn.ubuntu.com/3810-1/ |
Configurations
Configuration 1 (hide)
|
Information
Published : 2018-06-14 13:29
Updated : 2020-02-24 07:55
NVD link : CVE-2018-11574
Mitre link : CVE-2018-11574
JSON object : View
Products Affected
point-to-point_protocol_project
- point-to-point_protocol