CVE-2018-11574Improper Input Validation in Protocol Project Point-to-point Protocol

Severity
9.8CRITICALNVD
EPSS
0.4%
top 38.89%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 14
Latest updateMay 13

Description

Improper input validation together with an integer overflow in the EAP-TLS protocol implementation in PPPD may cause a crash, information disclosure, or authentication bypass. This implementation is distributed as a patch for PPPD 0.91, and includes the affected eap.c and eap-tls.c files. Configurations that use the `refuse-app` option are unaffected.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

debiandebian/ppp< ppp 2.4.7-2+3 (bookworm)
Debiansamba/ppp< 2.4.7-2+3+3

Also affects: Ubuntu Linux 14.04, 16.04, 18.04

Patches

🔴Vulnerability Details

2
GHSA
GHSA-hx7c-3c6c-mhm3: Improper input validation together with an integer overflow in the EAP-TLS protocol implementation in PPPD may cause a crash, information disclosure,2022-05-13
OSV
CVE-2018-11574: Improper input validation together with an integer overflow in the EAP-TLS protocol implementation in PPPD may cause a crash, information disclosure,2018-06-14

📋Vendor Advisories

3
Ubuntu
ppp vulnerability2018-11-06
Red Hat
ppp: Remote client crash in ppp EAP-TLS patch2018-06-12
Debian
CVE-2018-11574: ppp - Improper input validation together with an integer overflow in the EAP-TLS proto...2018

💬Community

2
Bugzilla
CVE-2018-11574 ppp: Remote client crash in ppp EAP-TLS patch [fedora-all]2018-06-12
Bugzilla
CVE-2018-11574 ppp: Remote client crash in ppp EAP-TLS patch2018-06-05