Point-to-point Protocol Project

Point-to-point Protocol

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 65.99%
  • Veröffentlicht 03.02.2020 23:15:11
  • Zuletzt bearbeitet 21.11.2024 05:39:05

eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions.

  • EPSS 0.43%
  • Veröffentlicht 14.06.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:43:38

Improper input validation together with an integer overflow in the EAP-TLS protocol implementation in PPPD may cause a crash, information disclosure, or authentication bypass. This implementation is distributed as a patch for PPPD 0.91, and includes ...

  • EPSS 1.51%
  • Veröffentlicht 24.04.2015 14:59:11
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Buffer overflow in the rc_mksid function in plugins/radius/util.c in Paul's PPP Package (ppp) 2.4.6 and earlier, when the PID for pppd is greater than 65535, allows remote attackers to cause a denial of service (crash) via a start accounting message ...

  • EPSS 1.48%
  • Veröffentlicht 15.11.2014 21:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Integer overflow in the getword function in options.c in pppd in Paul's PPP Package (ppp) before 2.4.7 allows attackers to "access privileged options" via a long word in an options file, which triggers a heap-based buffer overflow that "[corrupts] se...

  • EPSS 0.06%
  • Veröffentlicht 05.07.2006 18:05:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The winbind plugin in pppd for ppp 2.4.4 and earlier does not check the return code from the setuid function call, which might allow local users to gain privileges by causing setuid to fail, such as exceeding PAM limits for the maximum number of user...

  • EPSS 0.82%
  • Veröffentlicht 31.12.2004 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

SQL injection vulnerability in the Authorize.net callback code (subscriptions/authorize.php) in Jelsoft vBulletin 3.0 through 3.0.3 allows remote attackers to execute arbitrary SQL statements via the x_invoice_num parameter. NOTE: this issue might b...