CVE-2014-3158
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
15/11/2014
Last modified:
12/04/2025
Description
Integer overflow in the getword function in options.c in pppd in Paul's PPP Package (ppp) before 2.4.7 allows attackers to "access privileged options" via a long word in an options file, which triggers a heap-based buffer overflow that "[corrupts] security-relevant variables."
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:point-to-point_protocol_project:point-to-point_protocol:*:*:*:*:*:*:*:* | 2.4.6 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://advisories.mageia.org/MGASA-2014-0368.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136932.html
- http://marc.info/?l=linux-ppp&m=140764978420764
- http://www.debian.org/security/2014/dsa-3079
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A135
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.ubuntu.com/usn/USN-2429-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1128748
- https://github.com/paulusmack/ppp/commit/7658e8257183f062dc01f87969c140707c7e52cb
- http://advisories.mageia.org/MGASA-2014-0368.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136932.html
- http://marc.info/?l=linux-ppp&m=140764978420764
- http://www.debian.org/security/2014/dsa-3079
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A135
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.ubuntu.com/usn/USN-2429-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1128748
- https://github.com/paulusmack/ppp/commit/7658e8257183f062dc01f87969c140707c7e52cb



