CVE-2018-11574
Summary
| CVE | CVE-2018-11574 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-06-14 20:29:00 UTC |
| Updated | 2023-09-11 19:43:00 UTC |
| Description | Improper input validation together with an integer overflow in the EAP-TLS protocol implementation in PPPD may cause a crash, information disclosure, or authentication bypass. This implementation is distributed as a patch for PPPD 0.91, and includes the affected eap.c and eap-tls.c files. Configurations that use the `refuse-app` option are unaffected. |
Risk And Classification
Problem Types: CWE-20 | CWE-190
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Canonical | Ubuntu Linux | 14.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 16.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 18.04 | All | All | All |
| Application | Point-to-point Protocol Project | Point-to-point Protocol | All | All | All | All |
| Application | Point-to-point Protocol Project | Point-to-point Protocol | - | All | All | All |
| Application | Point-to-point Protocol Project | Point-to-point Protocol | - | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| oss-security - Buffer Overflow in pppd EAP-TLS implementation | MLIST | www.openwall.com | Mailing List, Patch, Third Party Advisory |
| USN-3810-1: ppp vulnerability | Ubuntu security notices | Ubuntu | UBUNTU | usn.ubuntu.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 670242 EulerOS Security Update for ppp (EulerOS-SA-2021-1834)