CVE-2014-3158Improper Restriction of Operations within the Bounds of a Memory Buffer in PPP

Severity
7.5HIGHNVD
EPSS
1.5%
top 18.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 15
Latest updateMay 13

Description

Integer overflow in the getword function in options.c in pppd in Paul's PPP Package (ppp) before 2.4.7 allows attackers to "access privileged options" via a long word in an options file, which triggers a heap-based buffer overflow that "[corrupts] security-relevant variables."

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages3 packages

debiandebian/ppp< ppp 2.4.6-3 (bookworm)
Debiansamba/ppp< 2.4.6-3+3

🔴Vulnerability Details

2
GHSA
GHSA-4rmp-xhjh-jrfr: Integer overflow in the getword function in options2022-05-13
OSV
CVE-2014-3158: Integer overflow in the getword function in options2014-11-15

📋Vendor Advisories

3
Ubuntu
ppp vulnerability2014-12-01
Red Hat
ppp: integer overflow in option parsing2014-08-10
Debian
CVE-2014-3158: ppp - Integer overflow in the getword function in options.c in pppd in Paul's PPP Pack...2014

💬Community

2
Bugzilla
CVE-2014-3158 ppp: integer overflow in option parsing2014-08-11
Bugzilla
CVE-2014-3158 ppp: potential security vulnerability [fedora-all]2014-08-11