CVE-2018-11574

Improper input validation together with an integer overflow in the EAP-TLS protocol implementation in PPPD may cause a crash, information disclosure, or authentication bypass. This implementation is distributed as a patch for PPPD 0.91, and includes the affected eap.c and eap-tls.c files. Configurations that use the `refuse-app` option are unaffected.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 64%
VendorProductVersion
point-to-point_protocol_projectpoint-to-point_protocol
𝑥
< 2.4.9
canonicalubuntu_linux
14.04
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ppp
bullseye
2.4.9-1+1
fixed
stretch
not-affected
jessie
not-affected
wheezy
not-affected
bookworm
2.4.9-1+1.1
fixed
sid
2.5.0-1+2
fixed
trixie
2.5.0-1+2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ppp
cosmic
Fixed 2.4.7-2+3ubuntu1
released
bionic
Fixed 2.4.7-2+2ubuntu1.1
released
artful
ignored
xenial
Fixed 2.4.7-1+2ubuntu1.16.04.1
released
trusty
Fixed 2.4.5-5.1ubuntu2.3
released