CVE-2014-3158

Integer overflow in the getword function in options.c in pppd in Paul's PPP Package (ppp) before 2.4.7 allows attackers to "access privileged options" via a long word in an options file, which triggers a heap-based buffer overflow that "[corrupts] security-relevant variables."
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
ChromeCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 78%
VendorProductVersion
point-to-point_protocol_projectpoint-to-point_protocol
𝑥
≤ 2.4.6
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ppp
bullseye
2.4.9-1+1
fixed
bookworm
2.4.9-1+1.1
fixed
sid
2.5.0-1+2
fixed
trixie
2.5.0-1+2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ppp
utopic
Fixed 2.4.5-5.1ubuntu3.1
released
trusty
Fixed 2.4.5-5.1ubuntu2.1
released
precise
Fixed 2.4.5-5ubuntu1.1
released
lucid
Fixed 2.4.5~git20081126t100229-0ubuntu3.1
released