lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <16774.49886.264509.824857@cargo.ozlabs.ibm.com> Date: Tue, 2 Nov 2004 10:12:30 +1100 From: Paul Mackerras <paulus@...ba.org> To: Luke Macken <lewk@...too.org> Cc: gentoo-announce@...too.org, bugtraq@...urityfocus.com, full-disclosure@...ts.netsys.com, security-alerts@...uxsecurity.com Subject: Re: [ GLSA 200411-01 ] ppp: Remote denial of service vulnerability Luke Macken writes: > The pppd server improperly verifies header fields, making it vulnerable > to denial of service attacks. > > Impact > ====== > > An attacker can cause the pppd server to access memory that it isn't > allowed to, causing the server to crash. No code execution is possible > with this vulnerability, because no data is getting copied. Furthermore, only the connection to the attacker will be affected, since a separate pppd process handles each ppp connection. In other words, an attacker can terminate their own connection, but they can not affect any other connection, or prevent new connections from being established. Given that, I don't think that this is even a DoS vulnerability. Paul. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists