Name | CVE-2015-3310 |
Description | Buffer overflow in the rc_mksid function in plugins/radius/util.c in Paul's PPP Package (ppp) 2.4.6 and earlier, when the PID for pppd is greater than 65535, allows remote attackers to cause a denial of service (crash) via a start accounting message to the RADIUS server. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-205-1, DSA-3228-1 |
Debian Bugs | 782450 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
ppp (PTS) | jessie, jessie (lts) | 2.4.6-3.1+deb8u1 | fixed |
stretch (security), stretch (lts), stretch | 2.4.7-1+4+deb9u1 | fixed | |
buster (security), buster, buster (lts) | 2.4.7-2+4.1+deb10u1 | fixed | |
bullseye | 2.4.9-1+1 | fixed | |
bookworm | 2.4.9-1+1.1 | fixed | |
sid, trixie | 2.5.0-1+2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
ppp | source | squeeze | 2.4.5-4+deb6u2 | DLA-205-1 | ||
ppp | source | wheezy | 2.4.5-5.1+deb7u2 | DSA-3228-1 | ||
ppp | source | (unstable) | 2.4.6-3.1 | 782450 |
https://www.openwall.com/lists/oss-security/2015/04/13/4
Patch: https://bugs.debian.org/cgi-bin/bugreport.cgi?msg=17;filename=ppp_2.4.6-3.1-nmu.diff;att=1;bug=782450